There are a number of ways in which the transportation sector can approach cybersecurity. For some years now, it has been concluded that cybercrime is on the rise. The main target is the transport system or generally the infrastructural system as a whole. Most governments have come up with ways in which they can counteract cybercrime (Rasmi & Al-Qerem, 2015). The first approach is to identify infrastructures and assets that seem to be vulnerable and most critical in terms of safety, economic governance, and national security’s well being because they are being targeted by cybercriminals. The transport system should be offered maximum protection by the local and state governments (Phair, 2014).
Second, preparedness and being alert on the possible attacks on the transport system is also a priority area of the transport sector. The targeted infrastructures and assets that are likely to be attacked anytime have been labeled as hotspots that require adequate monitoring so as to prevent cyber attacks and damage.
Offering protection to other supportive infrastructures in the transport system has been attained by establishing specific preventive measures and initiatives (Putte & Verhelst, 2013). In addition, encouraging research in the field of cybersecurity and facilitating active public-private partnerships have been implemented for some time now. The latter approach is capable of preventing future attacks by cybercriminals.
The transport sector has interfaced with other sectors in order to establish total critical infrastructure in terms of cybersecurity. This will not only provide cybersecurity to small and large organizations. Such a partnership will also offer much-needed security to individual citizens (Moteff, 2014).
Cyber laws that have been recently enacted address security platforms touching on the internet and emerging technologies such as computer hardware and software as well as general information systems. The existing laws prevent large scale damages that may be caused by cybercriminals. The laws also protect individuals’ confidential information and privacy (Putte & Verhelst, 2013).
Some of the elements that need protection include emails for both social and official functions. The laws ensure that internet users are safe when sharing personal and corporate data (Satti & Jafari, 2015).
Information technology (IT) has brought about myriads of cyberspace security challenges. While the contribution of IT in the growth of economies cannot be refuted, total critical infrastructure cybersecurity can hardly be achieved if proper interfaces do not exist. For instance, detection and prevention systems for threats geared towards the transport sector can act as powerful interfaces. This approach can holistically provide a safe platform in the transport sector and eventually guarantee effective cybersecurity and consequently minimize threats.
In regards to the future trends of cyber law in all sectors, it is evident that most governments and jurisdictions will continue to embrace the importance of enacting stricter and more streamlined legislations that can curtail crimes related to cyberspace (Kumar & Shah, 2014). Nonetheless, it will be inevitable to make such laws dynamic owing to the drastically and continuously changing nature of the crime. In other words, cybercrimes keep on evolving while criminals always re-invent themselves. Hence, we expect various sectors of the economy to adopt and robustly apply numerous legal measures (Kumar & Shah, 2014). Moreover, the effective application of cyber laws in the future will require further research and development as well as surplus capital investment.
References
Kumar, A., & Shah, J. (2014). The Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions. International Journal of Advanced Research In Computer Science, 5(8), 84-91.
Moteff, J. (2014). Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service. Washington, DC: Harvard University Press.
Phair, N. (2014). CC14 Feature – Cyber Crime Risks and Responsibilities for Businesses. Journal of the Australian & New Zealand Institute of Insurance & Finance, 37(5), 5-8.
Putte, D. V. & Verhelst, M. (2013). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers? Journal of Business Continuity & Emergency Planning, 7(2), 126-137.
Rasmi, M. & Al-Qerem, A. (2015). PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes. International Journal of Computer Network & Information Security, 7(2), 25-32.
Satti, R. & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes. International Journal of Computer Network & Information Security, 7(5), 16- 24.