preview

National Cybersecurity

Satisfactory Essays

The ITU National Cybersecurity strategy guide provides a cybersecurity framework from the cybersecurity workforce. There are three skills that a cybersecurity specialist must possess Management, Information Assurance and Technical to help combat the spread of cybercrime and cyberwarfare. Typical Cybersecurity Skills. Source: ITU National Cybersecurity Strategy Guide (ITU, National Cybersecurity Guide).
The ITU provides many courses for people to pursue worldwide. Cyber literacy is a very good initiative to learn about online issues affecting cyberspace and spread awareness. The courses are offered in various languages. The ITU has a lot of cyber Workforce that allows it to be on par in various technological areas. ITU offers about 30 courses; …show more content…

Somewhat echoing president Obama’s concerns. (Cyberwar: The Challenge to National Security Nathalie Caplan 2013, Volume 4)
This leads to a broader problem of disconnection between what the federal government is saying and what government agency are doing. The public is clueless to the dangers of cyberspace and only hear about the bad parts when someone, or country breach our networks. The government still function at a level of unbelievable denial of the truth, while the public …show more content…

It is clear that it does not take an army to conduct warfare in cyberspace. What we will need is an army to defend against a well-organized attack. However, I am hopeful that security technology, laws and deterrence’s will be on par with cyber-technologies being developed. With Internet of Things (IOT) on the horizon, governments has no choice but to try to make cyberwarfare obsolete. If not, the attack surface will be extremely large, making it more difficult to monitor and to intervene in an intrusion event in a timely manner. Incident responders will have the 24/7 task of defending our networks, and commerce will eventually slowly stop. The two files below compiled by the ITU shows both the growth and complexity we have faced from 2005 to 2015. This is also a good indicator of what is to come. Our attack surface is growing beyond our capabilities, and the only way I believe we can fix this is to copy the Chinese methodology. Start training the next generation of cyber offence and defensive personnel at a much earlier

Get Access