You are on page 1of 3

Running head: Cyberspace Defense Strategies

Most Urgent Cyberspace Defense Strategies that the US Develop

Surname

Institution

Cyberspace Defense Strategies

Most Urgent Cyberspace Defense Strategies that the US Develop


Cybersecurity is virtually one of the challenging issues that the Government of the US faces and
the treat is becoming more challenging by the day. To efficiently protect the lands cyberspace
the country must not only use our technical advantage but also it must encourage other
stakeholders to cooperate with it in its aim to curb rising threats. One of the most crucial steps
that can be developed to curb that legislation must encourage and foster information sharing
amongst all players. It will encompass both vertical and diagonal information flow from public
to the private sector and also amongst the private sector parties themselves respectively. Most on
the governmental bodies and agencies that have been formed collect as well as analyze data that
is linked directly to the cyber threats and for the systems that are used they also analyze
vulnerability. Some shared information includes the analysis that has discovered a new cyber
attack threat that penetrates the system of an entity. A hole that have been discovered in the
coding of a software is also a vital entity that is shared and as such allowing the concerned actors
in the Cybersecurity to prepare adequately for such threats by patching or entry disabling
offending software. Unfortunately in the modern corporation setup there is limited exchange of
critical information on such threats as most are concerned that the information shared may be
liable to regulators if the information is found misleading. FOIA (the Freedom of Information
Act) requires sharing of information amongst competitors but companies with a competitive edge
might find it hard to share their knowledge as the fear it might be counter consequential. If an
ideal Cybersecurity approach was implemented it would foster trust and widespread information
share which would improve the nature of cyberspace threats faced by the nation.
Most of the players in the private sectors ranging from hardware developers, computer code
developers, those offering information transmitting services as well as those responsible for
preventing intrusion into systems all deny responsibility for occurrence of cyberattacks. They
especially deny liability for damage that occurs to third parties and as such the enable creation of
classic market externality. When cybercriminals exploit the vulnerabilities of an existing
software piece such as Microsoft Office, the final consumer is liable to all the fiscal data that
they stole and not he code making company. The congress is required to urgently the existing
incentive system so as to reverse the cost bearing burden and as such render the manufacturer
more responsible. The government should come up with liability systems that enable the
manufacturer to adequately and timely compensate a client affected by their failure in their
developed code or hardware. It would guarantee cyber insurance to consumers and cause more
competent development of cyberspace infrastructure that is less vulnerable to attacks. Another
existing large hole in the cybersystem of the country is the supply chain security and most
affected parts being the hardware as well as the IT infrastructure installed. If malicious hard ware
is built into the chip it results into initiation of espionages and other cybercrime that are hard to
detect. An effective way that the congress can implement all these concerns is by establishing a
nonprofit organization that will be concerned with the evaluation and accrediting the supply
chain security of a companys technologies. By grading the companies it would enable curb

Cyberspace Defense Strategies

security threat as Underwriters Limited has guaranteed safety of consumer electronic appliances
in the country.
The government is required to establish Cyber Self-Defense mechanism all across the cyber
domain. The NSCS (the National Security Cyber Specialist) for example is in initial stages of
establishing laws for prosecuting cyber criminals. The Justice Department should consider
enlisting the help of firm that have a history of cyber threats. Such companies have established
recommendable infrastructure in analyzing data and mitigating the treats but the current laws
limit the companies to conducting security procedures only within their network. The
government thus limits its intelligence as it tactics in the cyberthreats acts as trap guns which
shoots every intruder who tries to have a shot at the system. Instead the government should come
up with better tactics that allows hacker to get booby trapped files so that they can identify real
interest of the hackers as well as be able to track their routes. The government should also
encourage cooperation with the private sector as they have internal ell endowed capabilities to
overcome threats from intruders. Another field that has been heavily underinvested in the
creation of awareness, educating as well as training of citizen as they currently depend heavily
on regular cable news to obtain such vital information. The main disadvantage with overreliance
of such platforms is that there consistent inaccuracy in the information supplied and up to date
intelligence is not adequately provided by such means of the public. There is still more room to
improve on the private sector as well as the general public organizations in bringing the issues to
the attention to the American citizenry. The once every year PR( Public Relations) stunt has
never been enough since the time it was incorporated and as such intuition s from universities to
private sector need to invest more in educating the masses. The government should develop
specialized programs on a professional level that trains individuals who are non IT work force to
be more adamant in understanding the security threats that the government answers to.
The government must also be interested and show willingness to develop a Cyber Workforce to
serve the whole industry especially in governmental branches as well as in technology industries.
It is especially critical for the high order tasks such as the cyberwarfare, defense on critical
infrastructure as well as defense on certain vital intellectual properties that are stored within the
cyberspace domain. The strategy will encompass adequate reformation STEM education made
up of Science, Technologies, engineering as well as mathematics. It would result into a more
talented workforce working in the most vital industry of today and as such ensuring that the
country benefits the most from the talent. The process begins by acquiring, registering and
maintaining a reliable teaching workforce. The last-in-first-out policies need to enact so as a
merit based system can kick in and aid the government in propagating the agenda. The length of
teaching is continuously showing less significance in the sector and as such better strategies for
reforming the educational sector would ensure that the country is supplied with a better working
force for the well being of the industry.