5 Dec 2022

105

How to Improve Cybersecurity on the Internet

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 805

Pages: 2

Downloads: 0

Cybersecurity is a global issue and it should be addressed both in wealthy nations and in developing nations. The fight for cybercrime has been enforced by governments and non-governmental organizations that can provide sufficient cybercrime incidence response ( Shires, 2018). In this paper, a detailed explanation of wealthy nations should work with developing nations to improve cybersecurity on the Internet. The paper will then give three important reasons for developing nations to have their own cybersecurity workflow. To add on that, the paper will discuss and give three reasons why it is risky for healthy nations not to help developing nations build a cybersecurity workforce by training and educating them. The roles played by European Union’s Network Security Agency (ENISA) and Commonwealth of Nation’s Chief Technology Officer (Commonwealth CTO) in helping member nations in developing effective cybersecurity strategies. Lastly, the paper will explain how NGOs can help in developing a global capacity for response of cybersecurity incidences. 

Reasons why developing nations should have their own Cybersecurity workforce 

In the first place, the stability of governments in developing countries is at stake provided the countries are vulnerable to cybercrime because a hack could be initiated form the government’s Hotmail. Another reason is the dependence on popular templates that exist which can easily be hacked instead of developing unique and efficient cybersecurity systems ( Baker, 2014). In additional to that, developing countries need their own effective cybersecurity workforce to reduce the huge financial losses experienced through cybersecurity ( Coulson, Mason & Nestler, 2018). If developing nations have their own cybersecurity workforce, they would create a more secure platform that would best solve cybercrime within the countries. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Risks faced by wealthy nations due to ineffective Cybercrime workforce in developing countries 

Wealthy nations also face risks when developing nations lack effective cybercrime workforce and they should also invest in training and educating their workforce. Among the risks faced by wealthy countries is the creation of ‘safe havens’ for cyber attackers as they can be engaging in cybercrime in wealthy countries while hiding in developing countries ( Coulson, Mason & Nestler, 2018). Secondly, lack of cybersecurity workforce and regulations in developing countries can result in insecure use of the Internet. As a result, gangs can take advantage and develop websites for trading drugs and weapons which once they are huge and stable; they could affect the well-being of wealthy countries as well. For instance, the Silk Road website was established in Mexico was also being used to sell drugs in the US but the mastermind was later arrested in San Francisco ( Coulson, Mason & Nestler, 2018). Lastly, lack of effective cybersecurity workforce in developing countries will influence the numerous foreign and global businesses operating in developing countries. As a result, the downfall in revenue of such global businesses will most likely affect the economy of the respective foreign nations. 

The roles of ENISA and Commonwealth CTO in helping member nations develop effective Cybercrime strategies 

International organizations like ENISA and Commonwealth CTO play important roles in helping member nations fight cybercrime. To begin with, the Commonwealth CTO developed a national cybersecurity strategy that was to be implemented in all member nations (Shires, 2018). The strategy was a multi-stakeholder partnership that included several entities like the private sector, public sector, civil society, and the academia. Laid down strategies included assessing risks by identifying vulnerabilities, threats, and consequences and managing them through controls and mitigations (Shires, 2018). Commonwealth CTO also focused on the desired end results and measuring progress towards it rather than only directing the way to achieve it. 

On the other hand, ENISA helps European Union countries by organizing exercises related to cyber crisis across Europe and supporting the cooperation between capacity building and computer emergency response teams (Raywood, 2013). To help develop cyber security strategies, ENISA also engages in studies and publishes reports on issues relating to cyber security including important aspects in data protection, cloud security, and identifying cyber threats. 

How non-governmental organizations can help in developing global capacity for Cybersecurity incidence response 

When it comes in cybersecurity incidence response, non-governmental organizations (NGOs) can also help in developing a global cybersecurity incidence response. NGOs can implement regulatory standards and approaches to enhance legitimate governance in the use of the Internet globally (Baker, 2014). These standards can help other organizations combat cybercrime globally by ensuring that certain breaches within their systems are managed. NGOs can also help in enhancing global cybersecurity incidence response by availing critical Internet infrastructure and resources that are not vulnerable to attacks (Baker, 2014). Additionally, initiating legal proceedings in support of incidence response can be made by NGOs in case of a breach in cyber security. These institutions can also receive, analyze, and synthesize vulnerability and incident information from other organizations and giving appropriate feedback through a common database. 

Conclusion 

Cybersecurity is a global issue that should be addressed not only in wealthy countries but also in developing countries. International organizations like ENISA and Commonwealth CTO can help member nation’s combat cybercrime by assessing risks and vulnerabilities in regarding cybercrime in member countries. 

References 

Baker, E. W. (2014). A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan. Information Technology for Development, 20(2), 122–139. https://doi.org/10.1080/02681102.2013.832131 

Coulson, T., Mason, M., & Nestler, V. (2018). Cyber Capability Planning and the Need for an Expanded Cybersecurity Workforce. Communications of the IIMA, 16(2), 1. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=134763694&site=eds-live 

Raywood, D. (2013). Developing nations are facing security challenges as they enter the cyber age. Retrieved from https://www.scmagazineuk.com/developing-nations-facing-security-challenges-enter-cyber-age/article/1482212 

Shires, J. (2018). Enacting Expertise: Ritual and Risk in Cybersecurity. Politics & Governance, 6(2), 31. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=130870514&site=eds-live 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). How to Improve Cybersecurity on the Internet.
https://studybounty.com/how-to-improve-cybersecurity-on-the-internet-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration