ALL >> Computers >> View Article
United States To Implement New Cyber Security Strategy
Threats in the cyber space have evolved over a period of time from intrusions to denial-of-service-attacks and attacks on industrial installations. The WikiLeaks exposure and the attacks by the Anonymous group on websites of PayPal, MasterCard, Amazon, Egyptian and Tunisian government and security firm HBGary Federal has highlighted the severity of the cyber threats. Cybercriminals may launch more destructive attacks in the near future as sophisticated attack toolkits are easily available. Terrorist organizations may take advantage of the emerging scenario to use cyberspace for perpetrating heinous crimes. Cyber-attacks on critical infrastructural facilities may cripple the economy of a country.
To deal with the vibrant threats in the cyber space, the U.S Department of Defense (DoD) has developed a new Cyber 3.0 strategy. The strategy has five pillars, which recognize the need for creating a force of cybercommandos, deployment of active defenses on military networks, steps to safeguard critical infrastructural facilities, evolving collective defense strategies with allies, and creating synergies between technological ...
... and human resources. Online computer training and cyber security training programs may help in creating secure IT work culture and ensure country's supremacy in the cyber space.
The threats in the cyber space require proactive action and intervention. The U.S DoD also plans to increase the number of military units having dedicated cyber missions. Inclusion of cyber security experts in military units is crucial to safeguard military networks from intrusion attempts by organized crime groups, terrorist organizations and rival intelligence agencies.
The country needs a strong force of cyber security experts such as network administrators, system administrators, ethical hacker certified personnel, security auditors and penetration testers. The department plans to expand the IT exchange program, which allows sharing of cyber security professionals between the government and the Industry.
U.S faces shortage of cyber security professionals. Government departments and business organizations must encourage IT employees to undertake security certification programs to update their technical skills and know-how.
The DoD recognizes the importance of improving cyber security and has sought $500 million to encourage companies to conduct research in new technologies such as cloud computing and encrypted data processing. Effective coordination between public and private companies is crucial to improve cyber security infrastructure. The government will seek new technologies from the industry to safeguard crucial networks from intrusions and cyber espionage.
Cybercriminals take advantage of heterogeneity in cyber laws across countries. Therefore, countries must collaborate with other countries to devise collective defense strategies and reach international agreements on cybercrime prevention.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






