ALL >> Computers >> View Article
Internet Policy Task Force Makes Recommendations To Combat Challenges Of Cyber Security
Information technology (IT) experts have been successful in leveraging Internet technology for diverse uses, revolutionizing the way businesses are run, governments function, and customers transact. However, Internet now stands at cross-roads, with increase in number of security threats. Cyber-attackers are using multifarious ways to infringe Internet infrastructure. According to some estimates quoted by U.S Commerce Secretary, over 45 new viruses, worms, spyware and other types of malicious threats were created every minute during the first quarter of the current year. The consistent and ever evolving threats pose challenge for governments to ensure security for consumers, businesses, military and government bodies. Cyber threats are now more sophisticated, frequent, indiscriminate and target-based.
The Internet Policy Task Force, of the Department of Commerce, United States, has recommended a new framework for addressing Internet security issues. The task force suggests creation of a nationally recognized approach to minimize threats for small businesses, brick and mortar companies, and large organizations that exist ...
... on Internet, that have provision for information services, facilitate transactional services over the Internet. The task force has referred to this group as Internet and Information Innovation Sector (I3S).The nationally recognized approach must include development of sector specific, and consensus based code of conduct to safeguard the I3S from varied cyber security threats. The government must encourage industry to develop innovative technology solutions, and promote use of emerging technologies such as cloud computing, and modernize security assurance policies.
The Internet Policy Task Force has advocated the need for creation of a national data breach notification law for appropriate disclosure of security incidents, and encouraging firms to improve security mechanisms. Sharing of information on cyber security incidents is crucial to improve defensive mechanisms. Government may use public policy tools such as liability protection, and insurance models to incentivize and promote best practices among I3S companies. Government must place emphasis on research, and work with industry to devise better cost-benefit analysis for I3S cyber security. Employee awareness is crucial to improve cyber security practices. Governments may asses the current cyber security education efforts, and encourage targeted and customized awareness programs in accordance with industry requirements. Employees may be encouraged to undertake online computer degree programs to understand and implement best practices in cyber security. The task force emphasizes on encouraging research and development to meet the future demands for effective technological solutions. IT professionals may leverage Online technology degree programs to update their technical know-how, and implement better security mechanisms.
Recent security incidents in major corporations have resulted in disclosure of sensitive information related to millions of individuals. Businesses face the challenge of strengthening information infrastructure, and ensuring security of customer and business databases. Vibrant threats have increased demand for cyber security professionals qualified in IT masters degree, computer science degree, computer forensics, network administration, penetration testing, and security threats.
Cybercriminals may conduct attacks from any part of the world. As such, government must coordinate with other countries to share threat information, best practices, and promote shared research and development goals. Government must encourage and develop cyber security standards, which converge with global practices.
Add Comment
Computers Articles
1. Exploring How Ai In The Cloud Can Transform Your BusinessAuthor: TechDogs
2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs
3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot
4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi
5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown
6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller
7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute
8. Top 7 Advantages Of React Js
Author: Bella Stone
9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone
10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD
11. Top 10 Healthcare Technology Trends
Author: goodcoders
12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith
13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press
14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.
15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA