123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

United States To Implement New Cyber Security Strategy

Profile Picture
By Author: iClass
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Threats in the cyber space have evolved over a period of time from intrusions to denial-of-service-attacks and attacks on industrial installations. The WikiLeaks exposure and the attacks by the Anonymous group on websites of PayPal, MasterCard, Amazon, Egyptian and Tunisian government and security firm HBGary Federal has highlighted the severity of the cyber threats. Cybercriminals may launch more destructive attacks in the near future as sophisticated attack toolkits are easily available. Terrorist organizations may take advantage of the emerging scenario to use cyberspace for perpetrating heinous crimes. Cyber-attacks on critical infrastructural facilities may cripple the economy of a country.

To deal with the vibrant threats in the cyber space, the U.S Department of Defense (DoD) has developed a new Cyber 3.0 strategy. The strategy has five pillars, which recognize the need for creating a force of cybercommandos, deployment of active defenses on military networks, steps to safeguard critical infrastructural facilities, evolving collective defense strategies with allies, and creating synergies between technological ...
... and human resources. Online computer training and cyber security training programs may help in creating secure IT work culture and ensure country's supremacy in the cyber space.

The threats in the cyber space require proactive action and intervention. The U.S DoD also plans to increase the number of military units having dedicated cyber missions. Inclusion of cyber security experts in military units is crucial to safeguard military networks from intrusion attempts by organized crime groups, terrorist organizations and rival intelligence agencies.

The country needs a strong force of cyber security experts such as network administrators, system administrators, ethical hacker certified personnel, security auditors and penetration testers. The department plans to expand the IT exchange program, which allows sharing of cyber security professionals between the government and the Industry.

U.S faces shortage of cyber security professionals. Government departments and business organizations must encourage IT employees to undertake security certification programs to update their technical skills and know-how.

The DoD recognizes the importance of improving cyber security and has sought $500 million to encourage companies to conduct research in new technologies such as cloud computing and encrypted data processing. Effective coordination between public and private companies is crucial to improve cyber security infrastructure. The government will seek new technologies from the industry to safeguard crucial networks from intrusions and cyber espionage.

Cybercriminals take advantage of heterogeneity in cyber laws across countries. Therefore, countries must collaborate with other countries to devise collective defense strategies and reach international agreements on cybercrime prevention.

Total Views: 356Word Count: 410See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: