Global Interconnectivity Around Cybersecurity

Improved Essays
bstract
An analysis is performed of global interconnectivity around cybersecurity and its impact on the pursuit of global commerce. Cultural influences, practices, and perspectives are reflected upon as they incorporate ethical, political, and social viewpoints. Cultural philosophical perspectives integrate attitudes, beliefs, values, and political agendas which help navigate tangible or intangible formations of a particular culture. As a result, products involve underlying beliefs and values and cultural practices. Studies show international trade and investment in technology promotes innovation, a key driver of competitiveness and financial growth. This paper will summarize cybersecurity interconnectedness, and its effect on the global
…show more content…
Moreover, cyberspace is an ever-growing strategic domain, but it’s different from the physical space through which society operates. Developing open networks has bolstered advancements of social progress. Global interconnectivity makes it possible for people to have fair access to information and balanced development across regions. Open networks has prompted cultural exchanges though social conflicts exist among people with diverse cultural backgrounds. Equally, there’s a level of confidence that fueling our economic growth through delivery of ideologies, innovation, and cultural values will help capitalize goods and services through trade and investment. The glaring reality is with the growing international market presence, cybersecurity is a growing global challenge that causes balanced and universal solutions. Even though with unification of the pursuit of global commerce, is a heightened focus on developing public policies and private sector norms where controlled adoption could well improve the cybersecurity posture of the global actors seeking globalization, through use of the Internet. We can speculate that most civilization is entirely connected through wireless …show more content…
(Whitehouse.gov, 2015). Over the last several years, the Internet, or more specifically “The Internet of Things (IoT)” has become important in stimulating the Nation’s economic competitiveness and promoting innovation and technological modernization. In parallel, the threat of cybersecurity continues to evolve that includes unselective and comprehensive attacks intended to exploit the interconnectedness the Internet offers. These threats target vulnerabilities that intercept sensitive data and disrupt systems and are intensified by the interconnected and interoperable architecture of today 's networking environment. Information systems are largely maintained and operated by the private sector, both nationally and internationally therefore addressing cybersecurity issues requires public-private partnerships as well as cooperation and understanding of international laws and cultural

Related Documents

  • Decent Essays

    9/11 Turning Point

    • 298 Words
    • 2 Pages

    September 11, 2001, was a terrible tragedy by any measure, but it was not a historical turning point. It herald a new era of international relations in which terrorists with a global agenda prevailed, or in which such spectacular terrorist attacks became commonplace. On the contrary, 9/11 has not replicated. Despite the attention devoted to the “Global War on Terrorism,” the most important developments of the last ten years have been the introduction and spread of innovative information technologies, globalization, the wars in Iraq and Afghanistan, and the political disruptions in the Middle East.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Brilliant Essays

    (Stewart, 2015) This effort should focus on key aspects necessary to enable practical mission bridging across the elements of U.S. cyber activities: foundational capabilities and investments such as upgraded infrastructure, increased bandwidth, and integrated operational capabilities; enhanced collaboration, including common technology, tools, and procedures; and enhanced shared situational awareness through shared analytic and collaborative…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Superior Essays

    International and domestic law are not perfect instruments to fight against cyberattacks, chemical, biological, radiological and nuclear (CBRN) agents and weapons, terrorism finance, or terrorism in general, the private sector and civilian population has to be involved. This is because the nature of these unconventional attacks, coupled with the impossibilities of “perfect security” only allows for a balancing of risk that can be achieved through a redundancy approach to managing these threats. The balancing of risk is optimal when the domestic and international law, the private sector, and the civilian population are working in tandem. The first section of this paper will define a realistic goal of security. The second section will explain the uniqueness of the threats mentioned above.…

    • 1425 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyberterrorism Cons

    • 120 Words
    • 1 Pages

    An enormous threat and instrument for warfare, “cyberterrorism”, with all its iterations, has potential for momentous damage, especially within infrastructures. With the potential for causing civil war, cyber sabotage is very likely to cause state to state interchanges. There is even a larger potential for war between nonstate entities. Just because there is no “ground zero physical crater”, it does not mean the scope of damage is not as significant. A Cyberterrorism preparation fund may be something most major corporations and governments need in this modern internet-technological age.…

    • 120 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is arguably as important if not exceeds the US Military in importance. The private sector, civilian businesses and personnel, lost more than one trillion dollars in 2008 as a result of cyberattacks. The four and a half million dollar Predator, the name of a certain type of military drone, had its camera feed hacked by a twenty-six dollar piece of software widely available on the Internet. The government nor the private sector are immune to security breaches, but which group is better equipped to protect America’s interests? Some critics will claim the private sector should set the standard for companies to follow.…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    CI Principle I (threat awareness): “Continuously analyze the strategies and tools that cyber adversaries use.” Julisch (2013) argues that the adversaries’ strategies will change, and in response, firms’ maturity regarding the Principle I will be dependent upon the firms’ responsiveness to adapt accordingly.2. CI Principle II (preparedness): “Minimize your attack surface, i.e. the number of vulnerabilities that the threat can exploit.” Julisch (2013) provides several opportunities to apply this principle: assessing and managing ‘cyber footprint’, more restrictive spam filtering, the outright deletion of high-risk attachments, and identifying and blocking malicious Web pages and outgoing command and control channels. 3.…

    • 1505 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Unified Field Theory

    • 3066 Words
    • 12 Pages

    Strategic information security field has increased in the last from century from World War I, World War II and the current and post the Cold War. Obviously, the status quo changed with the end of the Cold War and the onset of the September 11th?s attacks on America, the strategic security field is now abuzz with what will come next. Among the strategic security analysts, we have seen that Huntington believes in future conflict, which is based on ?civilization? lines drawn on a variety of geographic, religious beliefs and ethnicities among others. Each of these modern social scientists has created concepts from the past and present, as well as future paradigm shifts of how international security will evolve.…

    • 3066 Words
    • 12 Pages
    Improved Essays
  • Improved Essays

    Today as technology continues to advance, the growing concern of cyber terrorism has became an essential factor to the United States infrastructure and US-CERT (United States Computer Readiness Team). Presently, China is the leading force of these attacks against the United States in attempt to steal top secret information and data to improve their economy. In his article “ The code not taken: China, the United States, and the future of cyber espionage,” Adam Segal (2013) writes about the growing problems the United States have come to face with China’s attempts at hacking the United States infrastructure, military blue prints, and top secret government files. For example, China targeted defense contractors and subcontractors at the pentagon…

    • 851 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The government regulating the internet seems to be the question of the year. Throughout the years, laws and regulations on internet usage have gone back and forth and changed drastically when Net Neutrality, which prohibits the government from censoring the internet, was set into place. The debate has been going on since the beginning of the internet days. Now with the uprising of major social networking sites, the issue has escalated with even more at stake on the internet. Even though many think the government should not be allowed to oversee our internet usage, the government should be able to view our internet usage to keep the United States safe from deadly crimes, free for everyone, and peaceful for all people.…

    • 687 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Risk Management Framework

    • 44871 Words
    • 180 Pages

    interests from adversaries using cyberspace to their advantage and from our own efforts to employ the global nature of cyberspace to achieve objectives in military, intelligence, and business operations… “ “…For operational plans development, the combination of threats, vulnerabilities, and impacts must be evaluated in order to identify important trends and decide where effort should be applied to eliminate or reduce threat capabilities; eliminate or reduce vulnerabilities; and assess, coordinate, and deconflict all cyberspace operations…” “…Leaders at all levels are accountable for ensuring readiness and security to the same degree as in any other…

    • 44871 Words
    • 180 Pages
    Improved Essays
  • Improved Essays

    The steps I took with this assignment I first searched Privacy and Security in The Internet through Googles search engine then the Library Database. I read through the title of the articles to see which one came close to the topic. I then followed same steps on the Library database looking for Scholarly articles only. This article referenced how President Obama Administration is increasing our cybersecurity against cyberattacks.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Cyber attacks have been more sophisticated since the information available through social media like facebook, twitter and many more adding to internet world to share and be connected to world. People have been communicated over phone or internet comparing to past decade. China, USA, India are the top three users of internet as per statistics. Over half of the population of the world will have smartphones by the end of year 2018. When looking at the statistics above it is obvious that, more people are attracted to have technologies available and using them daily basis.…

    • 1171 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    has The National Security Strategy 2015, The National Military Strategy of the United States of America 2015, The DoD Cyber Strategy 2015, and the Department of Defense Strategy for Operating in Cyberspace July 2011. All of these strategies discuss the concern on impact to socioeconomic security, deterrence, and investigation. What is mentioned, but not supported in these documents are how do we regulate and protect, or what will we do to ensure compliance. Why would our strategy ever allow for a “voluntary cybersecurity framework” (White House, 2015)? Guidance without mandated regulation or oversight is not productive to making successful changes in state or global cyber defenses (Clarke & Knake,…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Following the industrial revolution, the way people all over the country communicate has fundamentally changed. People no longer see communication as a luxury, such as the way telecommunication was viewed in the nineteenth and twentieth centuries; instead we’ve come to a day in age in which a simple swipe of the thumb can spark a conversation that extends without boundaries, making us more connected now than ever before in history. Of course, there is always bad with the good. Cyber attacks and online crime rings are among the number one leading issues rising in the United States, as well as all over the world. It would only take one blast in the atmosphere for an entire continent to “go offline”.…

    • 1061 Words
    • 4 Pages
    Improved Essays