blog




  • Essay / Cybersecurity Research Paper - 1008

    Cyberattacks on the Internet occur daily - depending on their size, form, mechanism, level of sophistication and impact. Some cyberattacks may simply be a nuisance affecting a relatively small number of people and can be easily resolved, while other attacks may be damaging and costly, affecting millions of users (Kramer, Starr, & Wentz, 2009). It is now more clear than ever that effective defensive cybersecurity technologies and policies must be designed and implemented to counter the full range of cyberattacks occurring at the enterprise, national and international levels. There are a range of emerging cybersecurity technologies that organizations can use. may implement, among others: remote agent technologies, real-time forensic analysis technologies, sophisticated network-based defense technologies and big data technologies. Additionally, the federal government's role is critical to the development and effectiveness of these and other emerging cybersecurity technologies. Certain policies need to be established and implemented, with government support in order to effectively counter cyberattacks at the corporate, national and international levels.2. Emerging Cybersecurity Technologies Many current cyber defenses are outdated and static and therefore cannot effectively respond to the growing number of dynamic threats (University of Maryland University College [UMUC], 2012). Thus, new technologies need to be developed to dynamically evaluate networks in real time. Examples of such emerging technologies include remote agent technologies and real-time forensic analysis technologies. Remote agent technologies and real-time forensic analysis technologies Traditional methods such as compliance audits and patches have become...... middle of paper .... ..nuclear war. These include the US Navy's Cooperative Engagement Capability (CEC) and the US Army's BCT Network (O'Neil, 2007). For businesses, firewalls should be implemented at a basic level, with increasing sophistication as needed. security based on business security needs. At the national level, firewalls should be implemented in such a way that countries can build their network architecture around firewall choke points through which traffic must pass for analysis. For national-level protection, NIDS tools should be deployed on Internet service provider (ISP) networks at points of interconnection with other countries. For example, the US government or military should apply NIDS tools to monitor all traffic entering or leaving the country, looking for coordinated attacks (Kramer et al., 2009, p.. 191).