123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

United States To Implement New Cyber Security Strategy

Profile Picture
By Author: iClass
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Threats in the cyber space have evolved over a period of time from intrusions to denial-of-service-attacks and attacks on industrial installations. The WikiLeaks exposure and the attacks by the Anonymous group on websites of PayPal, MasterCard, Amazon, Egyptian and Tunisian government and security firm HBGary Federal has highlighted the severity of the cyber threats. Cybercriminals may launch more destructive attacks in the near future as sophisticated attack toolkits are easily available. Terrorist organizations may take advantage of the emerging scenario to use cyberspace for perpetrating heinous crimes. Cyber-attacks on critical infrastructural facilities may cripple the economy of a country.

To deal with the vibrant threats in the cyber space, the U.S Department of Defense (DoD) has developed a new Cyber 3.0 strategy. The strategy has five pillars, which recognize the need for creating a force of cybercommandos, deployment of active defenses on military networks, steps to safeguard critical infrastructural facilities, evolving collective defense strategies with allies, and creating synergies between technological ...
... and human resources. Online computer training and cyber security training programs may help in creating secure IT work culture and ensure country's supremacy in the cyber space.

The threats in the cyber space require proactive action and intervention. The U.S DoD also plans to increase the number of military units having dedicated cyber missions. Inclusion of cyber security experts in military units is crucial to safeguard military networks from intrusion attempts by organized crime groups, terrorist organizations and rival intelligence agencies.

The country needs a strong force of cyber security experts such as network administrators, system administrators, ethical hacker certified personnel, security auditors and penetration testers. The department plans to expand the IT exchange program, which allows sharing of cyber security professionals between the government and the Industry.

U.S faces shortage of cyber security professionals. Government departments and business organizations must encourage IT employees to undertake security certification programs to update their technical skills and know-how.

The DoD recognizes the importance of improving cyber security and has sought $500 million to encourage companies to conduct research in new technologies such as cloud computing and encrypted data processing. Effective coordination between public and private companies is crucial to improve cyber security infrastructure. The government will seek new technologies from the industry to safeguard crucial networks from intrusions and cyber espionage.

Cybercriminals take advantage of heterogeneity in cyber laws across countries. Therefore, countries must collaborate with other countries to devise collective defense strategies and reach international agreements on cybercrime prevention.

Total Views: 413Word Count: 410See All articles From Author

Add Comment

Computers Articles

1. How To Build A Peer-to-peer Marketplace?
Author: brainbell10

2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10

3. Everything You Need To Know About Web Development In 2026
Author: chetna

4. Create A Strong Online Presence Today
Author: FutureGenApps

5. User Experience Design
Author: brainbell10

6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10

7. The Thrilling World Of Geometry Dash Lite
Author: Hattie

8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas

9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas

10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC

11. Unreal Game Development
Author: brainbell10

12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

15. Why Choose Sataware?
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: