123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Internet Policy Task Force Makes Recommendations To Combat Challenges Of Cyber Security

Profile Picture
By Author: eccuni
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Information technology (IT) experts have been successful in leveraging Internet technology for diverse uses, revolutionizing the way businesses are run, governments function, and customers transact. However, Internet now stands at cross-roads, with increase in number of security threats. Cyber-attackers are using multifarious ways to infringe Internet infrastructure. According to some estimates quoted by U.S Commerce Secretary, over 45 new viruses, worms, spyware and other types of malicious threats were created every minute during the first quarter of the current year. The consistent and ever evolving threats pose challenge for governments to ensure security for consumers, businesses, military and government bodies. Cyber threats are now more sophisticated, frequent, indiscriminate and target-based.

The Internet Policy Task Force, of the Department of Commerce, United States, has recommended a new framework for addressing Internet security issues. The task force suggests creation of a nationally recognized approach to minimize threats for small businesses, brick and mortar companies, and large organizations that exist ...
... on Internet, that have provision for information services, facilitate transactional services over the Internet. The task force has referred to this group as Internet and Information Innovation Sector (I3S).The nationally recognized approach must include development of sector specific, and consensus based code of conduct to safeguard the I3S from varied cyber security threats. The government must encourage industry to develop innovative technology solutions, and promote use of emerging technologies such as cloud computing, and modernize security assurance policies.

The Internet Policy Task Force has advocated the need for creation of a national data breach notification law for appropriate disclosure of security incidents, and encouraging firms to improve security mechanisms. Sharing of information on cyber security incidents is crucial to improve defensive mechanisms. Government may use public policy tools such as liability protection, and insurance models to incentivize and promote best practices among I3S companies. Government must place emphasis on research, and work with industry to devise better cost-benefit analysis for I3S cyber security. Employee awareness is crucial to improve cyber security practices. Governments may asses the current cyber security education efforts, and encourage targeted and customized awareness programs in accordance with industry requirements. Employees may be encouraged to undertake online computer degree programs to understand and implement best practices in cyber security. The task force emphasizes on encouraging research and development to meet the future demands for effective technological solutions. IT professionals may leverage Online technology degree programs to update their technical know-how, and implement better security mechanisms.

Recent security incidents in major corporations have resulted in disclosure of sensitive information related to millions of individuals. Businesses face the challenge of strengthening information infrastructure, and ensuring security of customer and business databases. Vibrant threats have increased demand for cyber security professionals qualified in IT masters degree, computer science degree, computer forensics, network administration, penetration testing, and security threats.

Cybercriminals may conduct attacks from any part of the world. As such, government must coordinate with other countries to share threat information, best practices, and promote shared research and development goals. Government must encourage and develop cyber security standards, which converge with global practices.

Total Views: 294Word Count: 512See All articles From Author

Add Comment

Computers Articles

1. How To Build A Peer-to-peer Marketplace?
Author: brainbell10

2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10

3. Everything You Need To Know About Web Development In 2026
Author: chetna

4. Create A Strong Online Presence Today
Author: FutureGenApps

5. User Experience Design
Author: brainbell10

6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10

7. The Thrilling World Of Geometry Dash Lite
Author: Hattie

8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas

9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas

10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC

11. Unreal Game Development
Author: brainbell10

12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp

13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management

14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify

15. Why Choose Sataware?
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: