Cyber Security Emergency Management: A Comprehensive Analysis

Verified

Added on  2023/06/10

|10
|2690
|167
Report
AI Summary
This report delves into the critical aspects of cyber security emergency management, emphasizing the importance of IT in enhancing disaster preparedness and consequence management. It offers recommendations for establishing effective emergency management systems within organizations, including leveraging IT, providing training, and assessing IT products. The report justifies these recommendations, highlighting the need for proactive strategies to counter cyber threats. It also explores the challenges of implementing cyber security models, the limitations of traditional regulatory approaches in the face of evolving cyber threats, and the need for new models. The report also discusses who should be regulated and the importance of government oversight in ensuring robust cyber security measures for both governmental and private organizations. It concludes with a call for a new approach to address 21st-century cyber security challenges.
Document Page
Running head: CYBER SECURITY EMERGENCY MANAGEMENT
Cyber Security Emergency Management
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY EMERGENCY MANAGEMENT
Table of Contents
Part 1...........................................................................................................................................................2
Recommendation for emergency management related cybersecurity issues............................................2
Justification for the recommendations.....................................................................................................2
Part 2...........................................................................................................................................................4
What needs to be done and how do we get people to do it?.....................................................................4
Will a traditional regulatory model work in this space?...........................................................................5
Does a newer model to address uniquely 21st century issues need to be developed?..............................5
Whom should the government regulate?..................................................................................................6
Conclusion...................................................................................................................................................6
Reference.....................................................................................................................................................8
Document Page
2CYBER SECURITY EMERGENCY MANAGEMENT
Part 1
Recommendation for emergency management related cyber security issues
As per the discussion that has been done in the relative paper, it has been noticed that according to the
Section 214 act of the E-Government of 2002, it must be ensured that Information Technology must be
used extensively to enhance the crisis preparedness of any organization (Haddow, Bullock & Coppola,
2017). This should prepare any organization to be responsive to the consequence management in case of
any emergency cyber security issues are noticed. Emergency management planning bridges the networks
in the form of per capita also in political organization in a community that has the ability to provide an
environment in the organization in which the collaboration is most likely to occur in formally making the
collaboration transferred into the emergency management planning easily (White, 2016). The
recommendations in which emergency management can be established in the organization can be
discussed further below:
Using information technology as an influence to enhance disaster management
Short term opportunities to enable IT
Primary IT capabilities with proper R&D to have them
Making way for a tool that would engage the stakeholders and inform them about the R&D
Investments
Improving acquisition and adoption of IT through training of the employees
Measurement and assessment of the IT products that are being used to check on emergency issues
Justification for the recommendations
Any company would feel to survive if there is no strategy applied for emergency management.
Emergency management makes a company impermeable to disastrous situations that may arise out of the
blue. In this part it will be justified about the recommendations for emergency management in an
Document Page
3CYBER SECURITY EMERGENCY MANAGEMENT
organization as made above (Kapucu & Hu, 2016). First and foremost the primary use of Information
Technology as an influence to enhance the disaster management or any other emergency situation forms
the basis of having an emergency management security system in any organization. Since most of the
threats and vulnerabilities that come into an organization arise due to the cyber world it is absolutely
necessary to implement it management system to tackle the vulnerabilities arriving from the cyber world.
In another recommendation it is required that short term opportunities are used to enable the IT
(Motapon, Dessaint & Al-Haddad, 2014). This is because the short term opportunities would make the IT
system more restraint in front of the attacks that a company faces from the cyber world.
However for this it is required that proper arrangement is done in terms of all the matters that has
been decided to make the organization be absolutely permeable in case of any emergency attacks arrive
from the cyber world.
Also implementing IT in a system of business process in an organization needs to implement fuel
tools required for the proper permeability of the organization (Senthilkumar, Ponmagal & Sujatha, 2016).
The stakeholders should be informed properly about them and also about the investments that R&D team
faces. If the stakeholders are not made understand the system can fall apart.
These tools and products required for implementing it for the emergency Management related
cyber security issues should be assessed well to check their work daily due to their implementation and
what effect it has on the organization.
In addition, it is needed that the adoption of IT in the business process very recently for
improving the acquisition the employees in the organization should be thoroughly trained to handle the
system well (Waugh, 2015). Since the emergency management system works to Shield the organization
mishandling them may lead to the exactly opposite requirement it serves.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY EMERGENCY MANAGEMENT
Part 2
What needs to be done and how do we get people to do it?
The primary need of any organization to implement the cyber systems to protect the entire
organization from any kind of further cyber threats is the understanding of the fact that the organizations
needs a cyber security system. The understanding of the fact that the need of security from cyber threats is
a must in these contemporary times is somewhat necessary, as it has been noticed that many organizations
have perished for being vulnerable to these threats.
First and foremost, an organization and the people related to it needs to understand the fact that
the threats in the cyber world have the ability to rob the company out of its most valuable assets and
hence make them completely understand the defense mechanisms of it (Min et al., 2015). The National
government fails to acknowledge the uncertainties that have the potential to strike at the foundations of
the traditional system of a state where it is the most uncertain. The administration has the requirements
that would reorganize the traditional architecture with respect to the cyber threats and their nature that has
been required to challenge the up-and-coming intimidation from the cyber domain. A government cannot
be dependent on any company; instead a company depends on the government. However, when a
company starts depending on the government, the company’s data and valuable information also begins to
depend on the government (Hogan & Newton, 2015). The need for cyber security model in every
organization should be induced within not only the organization but the government that handles it. It is
to be specified that people should be made aware of the entire cyber security plan and what it does to an
organization and the government that handles it by training module and repeated foreshadowing on the
matter are providing examples of the previous cyber security attacks that has resulted in disruption in a
government and the subsequent organization (Awan et al., 2017).It can further be reinstated that an
organization and an entire nation should be made aware of the cyber security attacks and its results to
ensure a proper permeability of the entire government handling the organization and the entire country
from the alleged cyber security attacks.
Document Page
5CYBER SECURITY EMERGENCY MANAGEMENT
Will a traditional regulatory model work in this space?
In the previous times the regulatory model that were used to make an organization be in
permeable to attacks would not work further in case of cyber security attacks for the issue in the
following case study. This is because an organization nowadays implements various advanced technical
needs in order to thrive in the business world that has been changing ever since its inception and has
adopted the new technological advancements in the course (Lundberg et al., 2018). This means that the
business world now runs entirely or more specifically on the digital world. Therefore it becomes mobile
vulnerable to cyber security threats and much more open to the malicious attack cause that have been in
an organization or the entire country that governs it. Also according to the case study it has been found
that there are places where an organization seems to decide for a government (Carr, 2016). This is a much
greater issue because ideally a government should handle the matters of an organization and not the other
way around. This is because if a company starts deciding for government this would mean that the
intricate data of the government would be considered in the organization. Acquiring such a huge data and
protecting it from the cyber security threats is not something that the regulatory model of the traditional
Security System would work adequately on.
Does a newer model to address uniquely 21st century issues need to be developed?
From the above case study it can be noticed that Larry Clinton has described the government and
industry partnership with reference to a relationship between parent and child. The only difference
between this is child generally becomes reliant on the parents beat financially physically or emotionally.
However in case of the relationship between an industry and the government it has been seen that in the
latest circumstances in the United States the government is becoming reliant on the child because of the
cyber security threats and other cyber security systems (Radvanovsky & Brodsky, 2016).
In the old times business was dependent entirely on its physicality. That is the service the
provided or the appearance they shared had a physical existence. For example if a Logistics Company
delivered products to the customers it would be seen that the customer has approached the logistics
Document Page
6CYBER SECURITY EMERGENCY MANAGEMENT
organization to deliver them with the consignment of handling their products to a specified destination.
Nowadays the intermediate person having a physical existence is diminished and eradicated from the
business system because of the implementation of the online systems (Min et al., 2015). With the
advancement of Technology in the 21st century it has been noticed that all business organizations have
taken up or adapted to the advanced technology to benefit their business. Therefore all the threats that the
business can face comes from the cyber world and does not have a physical existence. Therefore to treat
the latest cyber security attacks it is needed that a new model be implemented to uniquely address these
issues.
Whom should the government regulate?
The failing of an organization means the slow disintegration of the government itself. Nowadays
it can always be seen that the faulty security systems in the organization against cyber security attacks has
led to many issues regarding data security in the organization which is affected the government is well.
This is resulted into the lack of proper implementation of cyber security best practices and relatively
simple fixes like software updates and security patches (Choejey et al., 2015). The organizations have
filled to attain this and this is created for the problems because the industry and organizations have
actually known to be for bigger stronger and more resourceful than the government. Therefore a
government should regulate the organizations to have a proper and feasible updated cyber security system
to save the organization from further cyber security threats and attacks and ensure that the company is
permeable to for the attacks in future.
Conclusion
In conclusion it can be stated from the above case study it can be noticed that Larry Clinton has
described the government and industry partnership with reference to a relationship between parent and
child. The only difference between this is child generally becomes reliant on the parents beat financially
physically or emotionally. However in case of the relationship between an industry and the government it
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY EMERGENCY MANAGEMENT
has been seen that in the latest circumstances in the United States the government is becoming reliant on
the child because of the cyber security threats and other cyber security systems. As per the case study
report suggest it can be seen that the threats that business organizations face nowadays are all based on
the cyber security attacks. With the advancement of Technology in the 21st century it has been noticed
that all business organizations have taken up or adapted to the advanced technology to benefit their
business. Therefore all the threats that the business can face come from the cyber world and do not have a
physical existence. Therefore to treat the latest cyber security attacks it is needed that a new model be
implemented to uniquely address these issues. The government should also regulate this system that every
governmental or private organization should implement tools and systems to become permeable to the
online threats.
Document Page
8CYBER SECURITY EMERGENCY MANAGEMENT
Reference
Awan, J. H., Memon, S., Khan, R. A., Noonari, A. Q., Hussain, Z., & Usman, M. (2017). Security
strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1),
51-58.
Carr, M. (2016). Public–private partnerships in national cybersecurity strategies. International
Affairs, 92(1), 43-62.
Choejey, P., Fung, C. C., Wong, K. W., Murray, D., &Xie, H. (2015, November). Cybersecurity practices
for E-Government: An assessment in Bhutan. In The 10th International Conference on e-
Business, Bangkok, Thailand.
Haddow, G., Bullock, J., & Coppola, D. P. (2017). Introduction to emergency management. Butterworth-
Heinemann.
Hogan, M., & Newton, E. (2015). Report on Strategic US Government Engagement in International
Standardization to Achieve US Objectives for Cybersecurity.
Kapucu, N., & Hu, Q. (2016). Understanding multiplexity of collaborative emergency management
networks. The American Review of Public Administration, 46(4), 399-417.
Lundberg, O., Yngwe, M. Å., Stjärne, M. K., Elstad, J. I., Ferrarini, T., Kangas, O., ...&Fritzell, J. (2018).
The role of welfare state principles and generosity in social policy programmes for public health:
an international comparative study. The Lancet, 372(9650), 1633-1640.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security
strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security
strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Document Page
9CYBER SECURITY EMERGENCY MANAGEMENT
Motapon, S. N., Dessaint, L. A., & Al-Haddad, K. (2014). A comparative study of energy management
schemes for a fuel-cell hybrid emergency power system of more-electric aircraft. IEEE
transactions on industrial electronics, 61(3), 1320-1334.
Radvanovsky, R., & Brodsky, J. (Eds.). (2016). Handbook of SCADA/control systems security. CRC
Press.
Senthilkumar, R., Ponmagal, R. S., & Sujatha, K. (2016). Efficient Health Care Monitoring and
Emergency Management System using IoT. International Journal of Control Theory and
Applications, 9(4), 137-145.
Waugh, W. L. (2015). Living with Hazards, Dealing with Disasters: An Introduction to Emergency
Management: An Introduction to Emergency Management. Routledge.
White, C. M. (2016). Social media, crisis communication, and emergency management: Leveraging Web
2.0 technologies. CRC press.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]