Cyber Security Sources for your Essay

International Diplomacy and Rise of Cyber Security Threats


International Diplomacy and Rise of Cyber Security Threats Cyber security is considered to be an ongoing issue for governments, the private sector and individuals all over the world. It is now unusual for more than a month to pass without news of a large and often significant cyber-attack (Kanuck)

International Diplomacy and Rise of Cyber Security Threats


Another wicked problem when it comes to International Diplomacy is the deficits. Research shows that the legitimacy deficit reflects a decreased level of trust in the institutions of international government and a fall in public confidence in the organizations of representative democracy (Korns)

International Diplomacy and Rise of Cyber Security Threats


Nevertheless, wicked difficulties can sometimes be objectively solved; they can merely be made worse or better. They are the conflicting of 'tame' problems, for instance creating a vaccine or constructing a skyscraper, which may be complex or even simple, but which can be resolved by putting on standardized techniques or approaches (Narangoa)

International Diplomacy and Rise of Cyber Security Threats


It rejects over-explanation and helps to clarify why wicked difficulties tend to stay behind for years or decades, challenging the best efforts of societies and governments. Research also shows that once the scale of a challenge like cyber security is made less impervious, the path is then opened for creative ideas that are more sufficiently address not just the signs but the root reasons of the problem (Rotfeld)

Cyber Security and Terrorism: Al-Qaeda, Boko Haram, and Tamil Tigers


They embraced the technology, and as the others did, they similarly took to sending propagandist messages to the public to intimidate them as well as make them submit to the agenda of the war. They later advanced to using the Internet to access government information and launched attacks on the people using the obtained information (Gerdes, 2009)

Cyber Security and Terrorism: Al-Qaeda, Boko Haram, and Tamil Tigers


They had a feeling that the government of the day was not representing their interest well. The organization was purely military with well-trained fighters from the community of the Tamils (Rajanayagam, 2013)

Cyber Security and Terrorism: Al-Qaeda, Boko Haram, and Tamil Tigers


This has seen them fight the Christian states with a serious verbosity while rallying the Muslim world to back their cause. They have made the Muslims in the world to believe that the Christians are their enemies (Saikia, 2010)

Cyber Security and Terrorism: Al-Qaeda, Boko Haram, and Tamil Tigers


Through this, they can make people live in fear and consequently subscribe to their ideology. In their plan, they wish to eradicate Western civilization from Nigeria and other countries that they have laid claim (Zenn, 2012)

Looking at the Federal Plan for Cyber Security and Information Assurance Research and Development


federal government plans to improve the country's cyber security through accelerating the availability of training and educational resources and material to significantly improve the cyber skills, knowledge and behavior of every sector of the population to create a safer and more secure cyber space for all. The NICE initiative has three objectives (Newhouse, 2012): 1

Looking at the Federal Plan for Cyber Security and Information Assurance Research and Development


This suggests that there was a possibility that some public organizations might have been attacked and might have not disclosed such information to the public. Plan Process The plan process is outlined below (Szykman and Lee, 2006): 1

Cyber Security and it Protocols


To test the system consultants will conduct random tests to identify vulnerabilities. (Oz, 2009) (Sousa, 2014) The disaster recovery plan will focus on isolating the threat

Cyber Security and it Protocols


The result is that the entire area can be completely cutoff and unable to communicate with the outside world. (Sousa, 2014) In many cases, everyone is relying on IT-based solutions to meet critical objectives, reduce collateral damage and restore services back to normal

Cyber Security and it Protocols


Throughout the process, they will work with staff members to address both internal and external threats. (Veiga, 2007) Internally, there are a number of checks and balances to prevent former / rouge employees from gaining access to sensitive information

Looking Into Cyber Security


Unnoticed change or alteration of information is much simpler to attain and achieve if the information being utilized is stored on electronic media compared to when it is stored on paper. This is both for the reason that modifications are more difficult to notice and pinpoint and also for the reason that there is more often than not a single copy of the information that necessitates alteration (Biba, 1977)

Looking Into Cyber Security


With the company in consideration being a financial institution, another recommended security model is the Chinese Wall Model. This is for the reason that the analysts in the financial organization have to cope with a number of consumers and also have to evade conflicts of interests (Brewer and Nash, 1989)

Looking Into Cyber Security


It is imperative to note that these vulnerabilities can be fixed by different approaches, comprising the application of software reinforcements, reconfiguring devices, or positioning countermeasures, for instance firewalls and antivirus software. This helps in making sure that there is a sustained and feasible poise between security and accessibility (Harris, 2013)

Looking Into Cyber Security


In addition, the company will also make certain that these policies are apparent and apprehended by all and sundry and most significantly, stringently enforced. The Design of a Code of Ethics Related to the IT Profession to Be Applied at The Company Every professional within an organization is mandated to abide by ethics so as to make way for the execution of effective and proper services and also safety to the consumers or the general public as a whole (Koehler and Pemberton, 2000)

Looking Into Cyber Security


To begin with, in the manual system, safe combination and also keys are entrusted to humans by their fellow humans and it is not in general hard to ascertain the trusted person. The individual opening a safe and observing the contents kept inside is more likely to be perceived by other individuals who will ascertain whether that individual is authorized (Landwehr, 2003)

Looking Into Cyber Security

External Url: http://www.linkedin.com/

In addition, any policies that concern the installation and utilization of external software ought to be communicated. Another aspect is that if there are any personal devices, for instance, laptops, smartphones and tablets, which access the network, they ought to be organized and aligned to do it in a safe manner, which can be undertaken easily with a consistent and dependable Mobile Device Management (MDM) solution (Lloyd, 2015)

Looking Into Cyber Security


7. Make sure there is compliance with the laws of the nation and the code of behavior laid out by the organization (Quinn, 2014)