¶ … Cyber Security Technology
Emerging Technology for Cyber Security
Real-World Examples of the use of Emerging Cyber Security Technologies
Government Efforts to enhance Cyber security Technologies
Benefits and Drawbacks of Government Efforts for new Cyber-security Technologies Conclusion
The development of internet and cyberspace represents of the most revolutionary technological advancement of humanity. Fewer countries and sectors are unaffected by the latest advancement of internet technologies. Although, recent technological phenomenon has influenced several areas, however, it represents one of the most serious security threats to modern society. As organizations and developed world are moving their critical infrastructures online, there are also ever growing cyber criminal activities attempting to steal sensitive data worth billions of dollars. Adversaries of cyber realms include spies from some countries and organized criminals attempting to steal sensitive information that include identities, and money. Complicated issues about the cyber threats consist of fundamental asymmetrical risks and ever-increasing waves of cyber attacks represent one of the serious and mounting security risks to business organizations, public agencies as well as individuals.
Defending against the waves of cyber attacks requires emerging cyber securities. Cyber security is the process of applying and providing security measures to enhance data integrity, confidentiality and availability. Typically, a cyber-security aims to assure protection of assets such as desktops, data, servers, buildings and humans. The goal of cyber-security is to protect asset in transit and at rest. Goodyear, Goerdel, Portillo, et al. (2010) define cyber-security as an information technology measure to achieve a desired level of protection using the CIA acronym to enhance Confidentiality, Integrity, and Availability of organizational data.
The option for emerging cyber-security is very essential because the traditional cyber-security systems are unable to control frequency and sophistication of cyber attacks, which have become imminent in the current IT world. The benefits that organizations could derive from an emerging cyber-security for the data confidentiality, integrity, and availability make increasing number of organizations to consider the emerging technologies to enhance security of their information assets. However, the emerging technologies are just recently being developed, and the efficacies of emerging cyber-security to thwart sophisticated cyber attacks have not yet been proven. Some of these technologies are in their youthful stage. Some as young as 12-month-old.
Objective of this paper is to explore the emerging cyber security technologies. The rest of the paper is organized as follows:
First, the paper identifies and discusses the emerging cyber securities and reveals recent research and development to improve cyber securities. Moreover, the paper provides different definitions of identified emerging security technologies and their main features.
Additionally, the study provides real world examples of the identified emerging cyber securities. The study also explores government efforts in nurturing and support cyber securities. Finally, the paper discusses several benefits and drawbacks of the government efforts for the improvement of emerging cyber securities.
Emerging Technology for Cyber Security
Kuehn, & Mueller, (2014) identify the BBP (Bug Bounty Program) as one of the new emerging cyber-security program used to identify and address the bug vulnerability in the computer systems. Software vulnerability is a computer code flaw, which is known as a security bug that can compromise the computer security. Typically, vulnerabilities can occur due to an unintended design of mathematical errors. A bug can persist for a long time within an organizational computer system before it is discovered. Typically, the bug vulnerability allows unauthorized individual to intrude into, manipulate, and steal data from organizational information systems. A software code that allows this type of vulnerability is called exploit. In essence, vulnerability allows the software exploit in order to circumvent organizational security systems. Software engineering expert has presented various novel approaches to design and test software in order to enhance software drug free.
Kuehn, & Mueller, (2014) further point out that many organizations have developed a new generation cyber security program called BBP (Bug Bounty Program). The program is an emerging cyber-security realm that has translated to the emerging practice and norms in the cyber-security paradigm. The new security paradigms have implication in the security and reliability of the internet. The BBP is a bug challenges reward or VRP (vulnerability rewards programs) aimed to reward penetrators, testers, independent security researchers as well as white hat hackers in order to share knowledge about operation of the BBP. (Bilge, & Dumitras, 2012). However, enhance cyber-security through monetary rewards from the BBP program is a new security development. Many software security vendors have incorporated the BBP program into their business objectives to enhance security platform...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now