Home > Free Essays > Tech & Engineering > Cyber Security > “Evolution of Federal Cyber Security” by J. Roth Review

“Evolution of Federal Cyber Security” by J. Roth Review Coursework

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Jan 14th, 2022

Legal integration progressions on cyber security in Asia, Europe, and the United States of America came into place at a very fast rate. It also led to immense development in technology within a very short time. As a result, recommendations for Federal Information Systems on security controls pointed out the importance of interrelationships, interoperability, and technical controls. These recommendations further suggested that the challenge of integration lies in global acceptance. However, later reports continued to show that there was visible progress to undertake mitigation of persistent weaknesses that were evident in most United States’ agencies. Even after training, the GAO report continued to demonstrate system control deficiencies due to failures in the identification of enough boundary security mechanisms, breakdown in the need to know, insufficient restriction of physical access, and improper identification of authentication of users to implement common security configuration policies (Roth, 2010).

Furthermore, there have been reports on lacked proper segregation of information technology duties due to inequities in access rights. Even after recent global threats such as H1N1, more than fifty percent of the audited agencies had not entirely given an address to continuity of operations and catastrophe revitalization planning. There were also missing nationwide information security programs showing delinking of agencies in the United States alone. Identification, facilitation, and integration keys to success include observation of many existing standards which comprise global challenges in risk management professionals. Application of process improvement frameworks to ensure understanding of business drivers of the team leading information systems was also proposed (Roth, 2010).

Whereas identification of parts of a full program and larger team is relatively easy, integration of the involved components may prove to be quite difficult. Sharing sensitive information among nations whose objectives are different is a daunting task given their obvious differences in political agenda. The integration will therefore be the best way to go about the issue since the idea of postmodernism has facilitated multiplicities instead of universalities (McAuley, Duberley & Johnson, 2008). Therefore, the rift created will lead to reluctance by agencies and therefore interfere with national integration. Given that the existing standards are extremely diverse, the formation of an integrated security system will require the use of similar standards to boost the security system of any organization that may be at risk of various security threats common in business organizations. This will in turn demand deconstruction of initial standards to contain uniformity which again is highly impossible in a postmodern world (McAuley, Duberley & Johnson, 2008). Although understanding of team business drivers through process improvement will change in unit construction, a lot of positive effort is necessary at any given time.

From this article, it is imperative to note that it is possible to change some of the conventional security systems and adopt new ones in a bid to meet new security challenges facing organizations in the 21st century. It is clear that the integration and incorporation of security systems worldwide on matters of global concern is extremely important. Despite the obvious boundaries in security systems all over the world, integrations should focus on report deliveries such that organizations are not deconstructed due to the presence of a world of diverse opinions that have been shaped by postmodernism. Despite diversities in global views on different matters, there is a need for collaboration on sensitive matters that relate to global security as those that concern human health. My mental opinion has been greatly affected to consider universalities on matters of absolute global impact. In addition, my individual perception regarding global issues will not be affected by postmodernism.

References

  1. McAuley, J., Duberley, J. & Johnson, P. (2008). Organization Theory, challenges and Perspectives: Postmodernism as a philosophy: the ultimate challenge to organization theory? Phoenix: Phoenix University Press.
  2. Roth, J (2010). Evolution of Federal Cyber security.
This coursework on “Evolution of Federal Cyber Security” by J. Roth Review was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.
Removal Request
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda.
Request the removal

Need a custom Coursework sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

certified writers online

Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, January 14). “Evolution of Federal Cyber Security” by J. Roth Review. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/

Reference

IvyPanda. (2022, January 14). “Evolution of Federal Cyber Security” by J. Roth Review. Retrieved from https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/

Work Cited

"“Evolution of Federal Cyber Security” by J. Roth Review." IvyPanda, 14 Jan. 2022, ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

1. IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth Review." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.


Bibliography


IvyPanda. "“Evolution of Federal Cyber Security” by J. Roth Review." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

References

IvyPanda. 2022. "“Evolution of Federal Cyber Security” by J. Roth Review." January 14, 2022. https://ivypanda.com/essays/evolution-of-federal-cyber-security-by-j-roth-review/.

References

IvyPanda. (2022) '“Evolution of Federal Cyber Security” by J. Roth Review'. 14 January.

Powered by CiteTotal, easy referencing generator
More related papers