Government Duties in Cyberspace Securing Report (Assessment)

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Cyberspace never goes unnoticed by anyone. It offers a basis for driving innovation and improvements in the area of overall welfare in the world. However, wide access to a digital infrastructure that is not regulated in a way that is strict enough provides a major risk to the governments, private businesses as well as the rights of individuals. Thus, the government is the primary body that is responsible for addressing the strategic disadvantages of cyberspace and making sure that the country along with its citizens can use the full range of resources offered by the technological revolution (The White House, n.d., p. 3).

The United States is facing a dual challenge that consists of both protecting the rights for privacy, promoting safety and civil liberties at the same time with driving innovation and efficiency

Cyberspace is a global domain that exists within the environment of technology and is made up of an information technology networks that include the Internet, computer systems, and networks of telecommunication (Phister, 2010, p. 3).

  1. The cyberspace has been a primary driver in transforming the worldwide economy and creating connections between people.
  2. The architecture of the digital space has been created in a way that includes efficiency as the primary factor rather than security.
  3. The private sector business is one of the primary targets of cyberattacks.

The government should inform the global community about the seriousness of its intentions of facing the challenges posed by cyberspace

While the government is interested in protecting the privacy rights of its citizens, it is interested in eliminating any barriers for innovation as well as the outstanding success achieved by the online community environment (The Department of Commerce Internet Policy Task Force, 2011, p. 6).

  1. The government should increase its accountability and the federal leadership in the topics that relate to the cyberspace security (The White House, n.d., p. 5). Such an approach is closely linked to clarifying the roles related to security at the same time with making sure that the necessary coordinations are made in order for the roles to implement their missions.
  2. The previous attempts of the government to secure the cyberspace only offered a temporary solution.
  3. Because each agency and institution can bring its own views to the issue of cyberspace safety, the issue itself exceeds the jurisdictional purview (The White House, n.d., p. 6).

By enhancing its cooperation with the private sector businesses in various jurisdictions, the government will be able to achieve success in the process of cyberspace securing

  1. The government can look into finding a data collection process that will show the quantity and the quality of the cyber attacks targeted at the private sector business.
  2. A strategy of cybersecurity should be created in such a manner that brings fellow nations together to discuss familiar issues like the use of force and legal norms that are deemed acceptable.
  3. Different national practices and laws implemented in different jurisdictions can offer insights into successful and unsuccessful ways of combating cybersecurity challenges in the private business sector.

During its work with the private sector business, the government should clearly state its objectives on cybersecurity for the infrastructure of future generations

  1. The benefits of technological advances should be harnessed in order for the government to state its requirements and needs on national security that also involves cybersecurity (Organization for Economic Co-Operation and Development, 2010, p. 13).
  2. The government should eliminate all instances of attacks on private and corporate sector cybersecurity on its part to make sure that the public perceives it as a conflict resolver rather than an attacker.
  3. By providing guidelines for the private sector businesses on how to create levels of security, protect collected data, and plan emergency measures for stolen or lost data, the government will be able to establish its authority in the process of cyber attack elimination.

Conclusion

In the process of dealing with cyber attacks, the government should become a primary driver of establishing rules and policies that take the issue down to the minimum. By respecting the fundamental right of privacy and encouraging innovations that will be beneficial for securing cyberspace, the government will be able to establish its authority in the private business sector as a guide and a protector. The most important steps include:

  • A detailed data-collection process that shows primary vulnerabilities in the cyberspace environment.
  • Harnessing the benefits of innovation and understanding that the previous attempts of cyberspace securing only offered a temporary solution.
  • Provision of comprehensive guidelines for following and designing a reliable system of cybersecurity within the private business sector.
  • Review of international practices implemented in different jurisdictions to get insights into successful and unsuccessful ways of combatting cybersecurity challenges in the private business sector.
  • The cybersecurity strategy should also be beneficial for the international community that will share its own experiences in resolving the cybersecurity issues.

References

Organization for Economic Co-Operation and Development. (2010). Cybersecurity Policy Making at a Turning Point. Web.

Phister, P. (2010). Cyberspace: The Ultimate Complex Adaptive System. The International C2 Journal, 4(2), 2-30. Web.

The Department of Commerce Internet Policy Task Force. (2011). . Web.

The White House. (n.d.). Cyberspace Policy Review. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 18). Government Duties in Cyberspace Securing. https://ivypanda.com/essays/government-duties-in-cyberspace-securing/

Work Cited

"Government Duties in Cyberspace Securing." IvyPanda, 18 July 2020, ivypanda.com/essays/government-duties-in-cyberspace-securing/.

References

IvyPanda. (2020) 'Government Duties in Cyberspace Securing'. 18 July.

References

IvyPanda. 2020. "Government Duties in Cyberspace Securing." July 18, 2020. https://ivypanda.com/essays/government-duties-in-cyberspace-securing/.

1. IvyPanda. "Government Duties in Cyberspace Securing." July 18, 2020. https://ivypanda.com/essays/government-duties-in-cyberspace-securing/.


Bibliography


IvyPanda. "Government Duties in Cyberspace Securing." July 18, 2020. https://ivypanda.com/essays/government-duties-in-cyberspace-securing/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1