The US National Transport Sector’ Cyber-Security Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

There are a number of ways in which the transportation sector can approach cybersecurity. For some years now, it has been concluded that cybercrime is on the rise. The main target is the transport system or generally the infrastructural system as a whole. Most governments have come up with ways in which they can counteract cybercrime (Rasmi & Al-Qerem, 2015). The first approach is to identify infrastructures and assets that seem to be vulnerable and most critical in terms of safety, economic governance, and national security’s well being because they are being targeted by cybercriminals. The transport system should be offered maximum protection by the local and state governments (Phair, 2014).

Second, preparedness and being alert on the possible attacks on the transport system is also a priority area of the transport sector. The targeted infrastructures and assets that are likely to be attacked anytime have been labeled as hotspots that require adequate monitoring so as to prevent cyber attacks and damage.

Offering protection to other supportive infrastructures in the transport system has been attained by establishing specific preventive measures and initiatives (Putte & Verhelst, 2013). In addition, encouraging research in the field of cybersecurity and facilitating active public-private partnerships have been implemented for some time now. The latter approach is capable of preventing future attacks by cybercriminals.

The transport sector has interfaced with other sectors in order to establish total critical infrastructure in terms of cybersecurity. This will not only provide cybersecurity to small and large organizations. Such a partnership will also offer much-needed security to individual citizens (Moteff, 2014).

Cyber laws that have been recently enacted address security platforms touching on the internet and emerging technologies such as computer hardware and software as well as general information systems. The existing laws prevent large scale damages that may be caused by cybercriminals. The laws also protect individuals’ confidential information and privacy (Putte & Verhelst, 2013).

Some of the elements that need protection include emails for both social and official functions. The laws ensure that internet users are safe when sharing personal and corporate data (Satti & Jafari, 2015).

Information technology (IT) has brought about myriads of cyberspace security challenges. While the contribution of IT in the growth of economies cannot be refuted, total critical infrastructure cybersecurity can hardly be achieved if proper interfaces do not exist. For instance, detection and prevention systems for threats geared towards the transport sector can act as powerful interfaces. This approach can holistically provide a safe platform in the transport sector and eventually guarantee effective cybersecurity and consequently minimize threats.

In regards to the future trends of cyber law in all sectors, it is evident that most governments and jurisdictions will continue to embrace the importance of enacting stricter and more streamlined legislations that can curtail crimes related to cyberspace (Kumar & Shah, 2014). Nonetheless, it will be inevitable to make such laws dynamic owing to the drastically and continuously changing nature of the crime. In other words, cybercrimes keep on evolving while criminals always re-invent themselves. Hence, we expect various sectors of the economy to adopt and robustly apply numerous legal measures (Kumar & Shah, 2014). Moreover, the effective application of cyber laws in the future will require further research and development as well as surplus capital investment.

References

Kumar, A., & Shah, J. (2014). The Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions. International Journal of Advanced Research In Computer Science, 5(8), 84-91.

Moteff, J. (2014). Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service. Washington, DC: Harvard University Press.

Phair, N. (2014). CC14 Feature – Cyber Crime Risks and Responsibilities for Businesses. Journal of the Australian & New Zealand Institute of Insurance & Finance, 37(5), 5-8.

Putte, D. V. & Verhelst, M. (2013). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers? Journal of Business Continuity & Emergency Planning, 7(2), 126-137.

Rasmi, M. & Al-Qerem, A. (2015). PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes. International Journal of Computer Network & Information Security, 7(2), 25-32.

Satti, R. & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes. International Journal of Computer Network & Information Security, 7(5), 16- 24.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, November 1). The US National Transport Sector' Cyber-Security. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/

Work Cited

"The US National Transport Sector' Cyber-Security." IvyPanda, 1 Nov. 2020, ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

References

IvyPanda. (2020) 'The US National Transport Sector' Cyber-Security'. 1 November.

References

IvyPanda. 2020. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

1. IvyPanda. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.


Bibliography


IvyPanda. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1