Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective
Cybersecurity as Organizational Strategy
Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met in order to secure the cyber realm for all of its legitimate constituents are enormous. Cybersecurity issues are organic, adapting to an evolving environment with the sensitivity and responsiveness of an invading microorganism. Though not to abuse the parallel to medical science, the best defenses against invading cyber threats are information and preparation. As such, cybersecurity can be characterized as technology plus network security plus information assurance ("Booz Allen Hamilton," 2011).
Strategic integration of cybersecurity efforts is measured by the degree to which it is integrated into enterprise risk management (ERM), overall mission assurance activities, and any associated internal and external security strategies (Bodeau, et al., 2010). The level of integration is typically expressed as follows: (a) No integration, in which each business process or program articulates its own security strategy; (b) consistency, in which the cybersecurity authorities with oversight for a different business units, missions, or risk domains work to ensure the implementation of cybersecurity strategy in their own arena and do not preclude implementation of cybersecurity strategy in any other arena; ( c) coordination, in which the authorities who are responsible for different cybersecurity strategies collaborate to execute the planning in order to more effectively leverage the resources of the enterprise; and, (d) full integration, in which there is an overarching and enterprise-wide mission assurance strategy that includes every domain of the enterprise mission, and is also effective across the larger critical infrastructure in the sector of which the enterprise may be a part (Bodeau, et al., 2010). As such, strategic integration refers specifically to the degree with which an enterprise's cybersecurity strategy aligns with, is informed by, or otherwise relates to other risk management strategies in the organization (Bodeau, et al., 2010). Typically, these cybersecurity strategies address the following: acquisition management, architecture, business continuity, mission assurance, and program management (Bodeau, et al., 2010). In the section of this paper entitled "Practical recommendations for cybersecurity strategy," integration is recommended as a key factor in effective cybersecurity strategy (Bodeau, et al., 2010).
Cybersecurity as an organizational strategy. The execution of cybersecurity is complex and multi-dimensional -- and, for many enterprises today, it is key to competitive strategy ("PCAST," 2007). Organizational cybersecurity solutions must be multi-faceted, capable of enhancing enterprise readiness and response while maintaining a robust focus on risk mitigation ("PCAST," 2007). The literature on cybersecurity spans a wide array of organizational types, including those in civil and commercial sectors of finance, energy, health, and technology, the defense industry, and national security agencies ("PCAST," 2007). This discussion will primarily present information related to cybersecurity as an organizational strategy.
Legal, ethical, and technical cybersecurity considerations. The legal aspects of cybersecurity are complex, so complex, in fact, that there are multiple categories that must be coordinated and eventually harmonized into a functioning legal framework (Schjolberg & Hubbard, 2005; Spinello, 2011). These categories include several types of governmental action: legislative efforts, judicial efforts, and criminal enforcement efforts. Under the legislative considerations of cybersecurity, there are additional legal categories, including substantive, procedural, mutual legal assistance, and protection of individual rights (Schjolberg & Hubbard, 2005; Spinello, 2011). The federal government and individual states may also enact laws that address cybercrime (Spinello, 2011).
At an international level, a number of official stakeholders have directed efforts to combating cybercrime through harmonizing and coordinating their efforts on a global scale (Schjolberg & Hubbard, 2005). The cybersecurity issue has become a focus for the following international organizations: United Nations (UN), International Telecommunications Union (ITU), Organization for Economic Co-operation and Development (OECD), European Union (EU) and Council of Europe (CoE) (Schjolberg & Hubbard, 2005).
Many professional organizations have codes of conduct for their members (Baase, 2008). ACM and IEEE-CS have developed the Software Engineering Code of Ethics (Baase, 2008). It is important to recognize that professional ethics are just part of the job (Baase, 2008). It is important to be honest when working with client -- or when conducting professional duties -- about capabilities, safety, and limitations of software (Baase, 2008).
While the cybersecurity industry is itself subject to innumerable laws and ethical considerations, research...
Future of Cyber Security Report on the Legal and Technical Future of Cyber Security The future of Cyber security relies on the quality of decisions that the government seconded by the private sector process as for now. Attacks on networks and databases have become a complex and lucrative activity that attracts a financial gain for people involved in that business. For this reason, there is a need to determine whether the existing
agency/organization in which you worked. Include information on the size of the organization (number of personnel, of what kinds) and the division of labor into units or departments. Obtain an organizational chart, or prepare one yourself, showing the formal structure of the organization. The organization where I worked from April 24, 2012 to June 29, 2012 was U.S. Immigration and Customs Enforcement (ICE). Created in 2003, it is the main
CHALLENGES AND BIBLICAL PRINCIPLES IN MANAGING INFORMATIONToday, public sector information managers are responsible for the collection, organization, maintenance, and dissemination of information by their respective government agencies and other public organizations. This role has assumed new importance and relevance in recent years as the flow of information continues to intensify. The purpose of this paper is to provide a review of the scholarly literature concerning the ethical and legal issues
Essay Topic Examples 1. The Ethical Dilemmas of Deepfake Technology: Explore the moral implications that arise from the use of deepfake technology, including the balance between freedom of expression and the potential for harm caused by misleading representations of individuals in media. 2. Deepfakes and the Future of Truth in Media: Discuss how deepfake videos challenge our notion of truth and authenticity in the media, including the impact on news, journalism, and
ISPS Code on Maritime Security Shipping is a business that has experienced rapid development in the past five decades as reflected in its increase by more than 450% during this period. The increase in shipping activities implies that nearly 90% of the global trade volumes are carried out by sea since a huge number of ships have to transport cargo between different ports. The increased use of ships to transport
Here, criminal law is of course preemptive in all jurisdictions, yet enforcement is restricted to agencies dedicated to law enforcement investigation and apprehension of individuals. In spite of billions of dollars spent on homeland security, in the aftermath of Katrina pediatric-specific preparations continue to lag behind. Lack of disaster readiness for hospitalized children and for those undergoing reunification process sheds light on the disjuncture of public administration duty to rescue
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now