logo

Evaluating Cyber Infrastructure: Insights on Security, Arguments, and Themes from Various Authors

   

Added on  2023-04-25

8 Pages2044 Words340 Views
 | 
 | 
 | 
Running head: CYBER INFRASTRUCTURE 1
Evaluation of the Arguments, Assertions and Themes of Different Authors Regarding Cyber
Infrastructure
Name
University Name
Professor's Name
Date
Evaluating Cyber Infrastructure: Insights on Security, Arguments, and Themes from Various Authors_1

CYBER INFRASTRUCTURE 2
Evaluation of the Arguments, Assertions and Themes of Different Authors Regarding Cyber
Infrastructure
What are some of the security problems that are related to cyberspace? Recent researches
have revealed that the risks associated with computer systems have increased greatly despite the
efforts that have been put in place to secure these systems. Thus, data is vulnerable to
exploitation by third parties and hackers. The main purpose of this paper is to analyze how
different authors view cyber infrastructure and critical infrastructure. The topics to be covered
includes; argument and thesis, Common themes and research for further research.
Argument and Thesis
Clement
In his book titled “Cyber Security and Global Independence”, Dave Clement argues that
there is continuous dependence on interconnected infrastructure. Food and water are some of the
sectors that have been viewed as critical (Clemente, 2013). He also argues that information
technologies play vital roles to ensure that these sectors are running smoothly hence
indispensable. However, security of computer systems have become very sophisticated despite
measures that have been undertaken by various organizations to secure these systems. His
argument focuses on what is critical. Inadequate application of security measures result in
vulnerability, thus enabling hackers to gain access to sensitive information hence increasing
cyber terrorism (Clemente, 2013). Therefore, there is a need to counter cyber terrorism around
the world. Adapt and invest are some of measures undertaken by governments to defend their
important infrastructures.
Bellovin, Bradner, Diffie, Landau & Rexford (2011)
Evaluating Cyber Infrastructure: Insights on Security, Arguments, and Themes from Various Authors_2

CYBER INFRASTRUCTURE 3
In this article “Can it really work”, the authors Bellovin, Bradner, Diffie and Rexford
(2011) have focused on the reasons why implementation of EISTEIN failed. This comes as a
result of the government efforts to ensure that its infrastructure has been protected. Initially, the
U.S. experienced several attacks not limited to IP spooning and DDoS. It is revealed that the
number of attacks increased greatly in 2000, hence plans to counter these attacks were not
inevitable. Following these developments, the process of protecting agencies from such
malevolent activities started in 2004 (Bellovin et al., 2011). The first phase is characterized by
deployment of EINSTEIN, which performed different tasks such as correlation and detecting
unusual activities in computer systems, and afterwards, attempts to halt the operations. Besides,
it keeps track of network traffic. In 2007, National Security Agency (NSA) intended to extent
implementation of EINSTEIN to private networks (Bellovin et al., 2011). However, the process
of implementing this program remained futile due to several factors such as scale and legal
issues.
Saadawi & Jordan (2011)
In their book titled “Cyber Security Protection”, Saadawi & Jordan (2011) have focused
on issues related to information security. Currently, the rate at which people, governments and
organizations depend on the internet has increased vastly. Consequently, the number of attacks
has increased. Recent research has revealed that organizations that deal with big data are targeted
mostly with an aim of getting access to financial information. Hence, organizations need to
integrate security mechanisms in their systems to counter unauthorized access. Besides, privacy
standards are vital to reduce risks (Saadawi & Jordan, 2011). In addition, citizen engagement
should be put into consideration when dealing with cybercrime, hence changing public policy is
not an option. However, protecting information has become very challenging due to emergence
Evaluating Cyber Infrastructure: Insights on Security, Arguments, and Themes from Various Authors_3

End of preview

Want to access all the pages? Upload your documents or become a member.