Cyber Security Research Paper

1008 Words3 Pages

Cyber attacks on the Internet occur on a daily basis - ranging in size, form, mechanism, level of sophistication and impact. Some cyber attacks can merely be a nuisance that affects a relatively small number of people with an easy fix, while other attacks can be detrimental and costly affecting millions of users (Kramer, Starr, & Wentz, 2009). It is now more apparent than ever that effective cybersecurity defensive technologies and policies need to be designed and implemented to counter the full range of cyber attacks that occur at the enterprise, national, and international levels.
There are a range of emerging cybersecurity technologies that organizations can implement, including: remote agent technologies, real-time forensic analyses technologies, sophisticated network-based defense technologies, and big data technologies. Moreover, the role of the federal government is vital to the nurture and efficacy of these and other emerging cybersecurity technologies. Certain policies need to be established and implemented, with backing and support from government in order to effectively counter cyber attacks at the enterprise, national, and international levels.
2. Emerging Cybersecurity Technologies
Many current cyber defenses are dated and static, and subsequently cannot effectively respond to the growing number of dynamic threats (University of Maryland University College [UMUC], 2012). Thus, new technologies need to be developed that can dynamically assess networks in real-time. Examples of such emerging technologies include remote agent technologies, and real-time forensic analyses technologies.
Remote Agent Technologies & Real-Time Forensic Analyses Technologies
Traditional methods such as compliance audits and patching have becom...

... middle of paper ...

...ntric warfare. These include the Cooperative Engagement Capability (CEC) of the United States Navy and the BCT Network of the United States Army (O’Neil, 2007).
For enterprises, firewalls should be implemented at a basic level, with increasing sophistication as needed for increased security based on the security needs of the enterprise. At the country-level, firewalls should be implemented in a way that nations can build their network architecture around firewall chokepoints through which traffic must pass for analysis. For country-level protection, NIDS tools should be deployed on Internet service provider (ISP) networks at points of interconnection with other countries. For example, the U.S. Government or military should apply NIDS tools to monitor all traffic coming into or going out of the country, looking for coordinated attacks (Kramer et al., 2009, p. 191).

More about Cyber Security Research Paper

Open Document