Importance of Cyber Security

Best Essays
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
People want the freedom and empowerment to use technology, while being protected against malicious actions. Protection starts with awareness and education, the government needs to begin empirical goals around previous campaign successes. President Obama noted, “The government is bringing about unprecedented transparency and liability for Americans to take part in their democracy.” (Obama, 2009).
Administration Key Cybersecurity Policy Principals
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...

... middle of paper ...

...ama, B. (2009, May). Remarks by the President on Securing Our Nation’s Cyber Infrastructure (President). Conducted at the East Room of the White House, Washington, DC. Retrieved from
National Institute of Standards and Technology. (2012, March/April). Basing Cybersecurity Training on User Perceptions. (IEEE Report 1540-7993/12). (pp. 40-49). Retrieved from University of Maryland University College IEEE Computer Society website:
United States Executive Office of the President. (2009). Cyber space policy review: Assuring a Trusted and Resilient Information and Communications Infrastructure. (pp. 1-38). Retrieved from
Get Access