The US National Transport Sector’ Cyber-Security Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

There are a number of ways in which the transportation sector can approach cybersecurity. For some years now, it has been concluded that cybercrime is on the rise. The main target is the transport system or generally the infrastructural system as a whole. Most governments have come up with ways in which they can counteract cybercrime (Rasmi & Al-Qerem, 2015). The first approach is to identify infrastructures and assets that seem to be vulnerable and most critical in terms of safety, economic governance, and national security’s well being because they are being targeted by cybercriminals. The transport system should be offered maximum protection by the local and state governments (Phair, 2014).

Second, preparedness and being alert on the possible attacks on the transport system is also a priority area of the transport sector. The targeted infrastructures and assets that are likely to be attacked anytime have been labeled as hotspots that require adequate monitoring so as to prevent cyber attacks and damage.

Offering protection to other supportive infrastructures in the transport system has been attained by establishing specific preventive measures and initiatives (Putte & Verhelst, 2013). In addition, encouraging research in the field of cybersecurity and facilitating active public-private partnerships have been implemented for some time now. The latter approach is capable of preventing future attacks by cybercriminals.

The transport sector has interfaced with other sectors in order to establish total critical infrastructure in terms of cybersecurity. This will not only provide cybersecurity to small and large organizations. Such a partnership will also offer much-needed security to individual citizens (Moteff, 2014).

Cyber laws that have been recently enacted address security platforms touching on the internet and emerging technologies such as computer hardware and software as well as general information systems. The existing laws prevent large scale damages that may be caused by cybercriminals. The laws also protect individuals’ confidential information and privacy (Putte & Verhelst, 2013).

Some of the elements that need protection include emails for both social and official functions. The laws ensure that internet users are safe when sharing personal and corporate data (Satti & Jafari, 2015).

Information technology (IT) has brought about myriads of cyberspace security challenges. While the contribution of IT in the growth of economies cannot be refuted, total critical infrastructure cybersecurity can hardly be achieved if proper interfaces do not exist. For instance, detection and prevention systems for threats geared towards the transport sector can act as powerful interfaces. This approach can holistically provide a safe platform in the transport sector and eventually guarantee effective cybersecurity and consequently minimize threats.

In regards to the future trends of cyber law in all sectors, it is evident that most governments and jurisdictions will continue to embrace the importance of enacting stricter and more streamlined legislations that can curtail crimes related to cyberspace (Kumar & Shah, 2014). Nonetheless, it will be inevitable to make such laws dynamic owing to the drastically and continuously changing nature of the crime. In other words, cybercrimes keep on evolving while criminals always re-invent themselves. Hence, we expect various sectors of the economy to adopt and robustly apply numerous legal measures (Kumar & Shah, 2014). Moreover, the effective application of cyber laws in the future will require further research and development as well as surplus capital investment.

References

Kumar, A., & Shah, J. (2014). The Threat of Advancing Cyber Crimes in Organizations: Awareness and Preventions. International Journal of Advanced Research In Computer Science, 5(8), 84-91.

Moteff, J. (2014). Critical Infrastructures: Background, Policy, and Implementation. Congressional Research Service. Washington, DC: Harvard University Press.

Phair, N. (2014). CC14 Feature – Cyber Crime Risks and Responsibilities for Businesses. Journal of the Australian & New Zealand Institute of Insurance & Finance, 37(5), 5-8.

Putte, D. V. & Verhelst, M. (2013). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers? Journal of Business Continuity & Emergency Planning, 7(2), 126-137.

Rasmi, M. & Al-Qerem, A. (2015). PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes. International Journal of Computer Network & Information Security, 7(2), 25-32.

Satti, R. & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes. International Journal of Computer Network & Information Security, 7(5), 16- 24.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, November 1). The US National Transport Sector' Cyber-Security. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/

Work Cited

"The US National Transport Sector' Cyber-Security." IvyPanda, 1 Nov. 2020, ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

References

IvyPanda. (2020) 'The US National Transport Sector' Cyber-Security'. 1 November.

References

IvyPanda. 2020. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

1. IvyPanda. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.


Bibliography


IvyPanda. "The US National Transport Sector' Cyber-Security." November 1, 2020. https://ivypanda.com/essays/the-us-national-transport-sector-cyber-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1