This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cybersecurity

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

 

 

 

 

 

 

 

 

 

 

 

 

 

 

RESEARCH SUMMARY

 

Cybersecurity

With the current digitization of every sector in the world today, life is becoming increasingly easier as individuals have access to impetus opportunities for individual expansion in all dimensions. [1]However, this accessibility of cyberspace drags a chunk of anomalies such as cybersecurity issues along. These issues have met impreciseness and bureaucratic inertia by people contending to handle them. At the same time, cyberspace has opened up chances for criminal fractions that inflict harm on others to gain illegal advantages over them. [2]In the past decades, myriads of studies have been adopted to investigate and evaluate this growing challenge on cybersecurity. Researches indicate that the increased rate of dependency on modern infrastructure does not consider the complexity of the contemporary ecosystem, which is adversely affecting both states and individuals.

Therefore, due to increased vulnerabilities, researchers have identified composite mechanisms to address the issue of cybersecurity alongside implicating the urgency for the adoption of corrective measures to control this pandemic. Available articles attempt to illuminate disclaimers on pertinent procedures that have utterly failed while trying to solve cyberspace attacks. In this light, I will explore the rise of cyber power, strategies the governments undertake to counter this issue, and the current challenges alongside solutions towards the achievement of these goals.

According to Sheldon (2013), the rising levels of cyber power are slowly turning out of control due to the current evolution of technology.[3] The world complexities have been handled by this technology, which, from a broader perspective, is generously impelling. However, these benefits tag along a couple of complications that slowly appear to be disastrous to humans and overall state security. Studies indicate that every facet of strategy is influenced by cyberspace and cyber power in one way or another. [4]Similarly, the current military capabilities and commands are in constant interactions and utterly dependent on cyberspace. This kind of connection avails susceptibilities that compromise the efficacy of a county’s defense systems. Hacktivism is a common construct in the infosphere domain, which is embedded in suppressing the privacy of data for individuals and states. This feature has resulted in cyber warfare, which the modern nations refer to as the third world war in the absence of weapons of mass destruction. It is a war that will inflict more damage if not curtailed early. Hence, governments are implored to take the initiative of adopting intractable procedures to combat this threat.

In light of this, the Canadian government has adopted the National Cyber Security Strategy, whose primary objective is to expand the capacities to investigate cybercrimes and build resilience.[5]It is also mandated to establish a coordination hub for both state and international agencies in an attempt to integrate resources for adequate identification of solutions towards this growing world terror. The strategy is leeway for Canada’s success and advancement in cybersecurity and a tool designed to meet the goals and priorities for all Canadians. However, Moens, Cushing, and Dowd (2015) establish that there prevail robust challenges that are sensitive and intrusive. Among the difficulties presented is the lack of balance between liberty and cybersecurity. Ideally, any government’s sovereign role is to protect its citizens from violence and invasion, which encompasses cyberspace attacks as a kind of intrusion.[6] In this light, studies reflect on the complications such as stifling business potential that will arise when the government decides to exercise excessive control on cybersecurity. Also, the governments experience rising costs and threats to national security as the cyberspace fraudsters embark on attacks on the government.

Thus, for success to prevail, it will require cooperation between the government and the private sector. Besides the prevailing undertones in the coercion of the government with these industries, it is the high time a positive relationship to be cultivated to culminate positive outcomes.[7] It is worth noting that there is insufficient evidence supporting this leadership and collaboration strategy, which creates room for more research to evaluate their efficacy. However, it is empirical for radical trails to be maintained. After all, success is predominant on a step at a time.

Bibliography

Moens, Alexander, Seychelle Cushing, and Alan W. Dowd.Cybersecurity Challenges for Canada and the United States. Fraser Institute, 2015: 1-27.

 

Public Safety Canada. National Cyber Security Strategy: Canada’s Vision for Security and Prosperity in the Digital Age. (2019). Retrieved From https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/index-en.aspx

 

Sheldon, John B. “The rise of cyber power.” Strategy in the contemporary world (2013): 282-298.

 

[1]Sheldon, John B. “The rise of cyber power.” Strategy in the contemporary world (2013): 282-298.

 

[2]Moens, Alexander, Seychelle Cushing, and Alan W. Dowd.Cybersecurity Challenges for Canada and the United States. Fraser Institute, 2015: 1-27.

 

[3] Sheldon, John B. “The rise of cyber power.” Strategy in the contemporary world (2013): 282-298.

[4]Ibid., 293

 

[5] Public Safety Canada. National Cyber Security Strategy: Canada’s Vision for Security and Prosperity in the Digital Age. (2019). Retrieved From https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/ntnl-cbr-scrt-strtg/index-en.aspx

 

[6] Moens, Alexander, Seychelle Cushing, and Alan W. Dowd.Cybersecurity Challenges for Canada and the United States. Fraser Institute, 2015: 1-27

 

[7] Ibid., 31

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask