Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
3 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Cyber Security, Innovation And National Power

Essay Instructions:

A paper of no less than 600 words responding with your ideas, suggestions and strategy recommendations for the formulation of this unified cyber policy directive. Finished paper should include your set of solutions that will address this evolving cyber threat.
Read the article titled, “Cybersecurity, Innovation and National Power” by Christopher Whyte.
You will find it at the link below. *If clicking the link does not work for you, please copy the link and paste it into your own browser in a separate window.
http://nationalinterest(dot)org/commentary/cybersecurity-innovation-national-power-8205
The last paragraph of the article reads, “A consolidated and unified cyber policy directive must be formulated and adopted with conviction. Picking off low-hanging fruit—such as increasing the security capabilities of individual systems—is certainly necessary. But linking these issues to the national interest will allow the government and other concerned parties to coordinate a nationwide set of solutions that address the evolving cyber threat.”

Essay Sample Content Preview:

CYBERSECURITY, INNOVATION AND NATIONAL POWER
Name:
Institution:
Date:
CITATION Chr13 \l 1033 (Whyte, 2013) notes that ‘subversive governments, could retool their playbooks to beat out U.S. companies in new market ventures around the world, while U.S. military units could lose a measure of the added effectiveness that comes from tactics adapted to new technological capabilities.’ This is an existential threat and Whyte suggests a unified policy to address it. It is undeniable that some other governments and companies have benefitted from the investment the united states in technology. He gives an example of a probable reason why China fast-tracked developing its stealth jet because it could have obtained the blueprints of America’s f-22A fighter jet CITATION Chr13 \l 1033 (Whyte, 2013). This is a matter of national concern that may have potentially reduced the efficacy of American arsenal in war. Other companies have also suffered from its business secrets being obtained unlawfully by their competitors in other countries sometimes with the help of subversive governments. He points out it is important for the government and other concerned parties to coordinate a nationwide set of solutions that address the evolving cyber threat. Here below are some recommendations that could help in forming a unified cyber policy directive.
The government can partner with companies to create new tools that can help protect their information, especially from cyber threats. The government can form an agency that is tasked with this objective to ensure it coordinates the efforts between the private and the government to guard against cyber threats. These tools can be created collaboratively with government agencies such as the CIA and exclusively provided to the companies to protect its information from hackers CITATION Dan18 \l 1033 (Patterson, 2018). This will help strengthen individual systems and protect them from the increasing security threats. From a unified front of the government and the private companies, the government can help the private companies access technologies that can help them avoid cyber-attacks. If the government works with the private sector, then it can help protect its people from the power of subversive governments and other international companies. It will also be easier for the country to classify an attack as on its companies as an attack on the government and therefore retaliate in the most appropriate way possible. As a unified front in the fight against cyber attack will also ensure that the government shares information with the private companies on their cyber threats and they can fashion tools against them which can be shared with other companies before they are attacked.
Organizing local penetration tests between companies and the government to find vulnerabilities before the subversive governments a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: