¶ … Cyber Security Technology
Emerging Technology for Cyber Security
Real-World Examples of the use of Emerging Cyber Security Technologies
Government Efforts to enhance Cyber security Technologies
Benefits and Drawbacks of Government Efforts for new Cyber-security Technologies Conclusion
The development of internet and cyberspace represents of the most revolutionary technological advancement of humanity. Fewer countries and sectors are unaffected by the latest advancement of internet technologies. Although, recent technological phenomenon has influenced several areas, however, it represents one of the most serious security threats to modern society. As organizations and developed world are moving their critical infrastructures online, there are also ever growing cyber criminal activities attempting to steal sensitive data worth billions of dollars. Adversaries of cyber realms include spies from some countries and organized criminals attempting to steal sensitive information that include identities, and money. Complicated issues about the cyber threats consist of fundamental asymmetrical risks and ever-increasing waves of cyber attacks represent one of the serious and mounting security risks to business organizations, public agencies as well as individuals.
Defending against the waves of cyber attacks requires emerging cyber securities. Cyber security is the process of applying and providing security measures to enhance data integrity, confidentiality and availability. Typically, a cyber-security aims to assure protection of assets such as desktops, data, servers, buildings and humans. The goal of cyber-security is to protect asset in transit and at rest. Goodyear, Goerdel, Portillo, et al. (2010) define cyber-security as an information technology measure to achieve a desired level of protection using the CIA acronym to enhance Confidentiality, Integrity, and Availability of organizational data.
The option for emerging cyber-security is very essential because the traditional cyber-security systems are unable to control frequency and sophistication of cyber attacks, which have become imminent in the current IT world. The benefits that organizations could derive from an emerging cyber-security for the data confidentiality, integrity, and availability make increasing number of organizations to consider the emerging technologies to enhance security of their information assets. However, the emerging technologies are just recently being developed, and the efficacies of emerging cyber-security to thwart sophisticated cyber attacks have not yet been proven. Some of these technologies are in their youthful stage. Some as young as 12-month-old.
Objective of this paper is to explore the emerging cyber security technologies. The rest of the paper is organized as follows:
First, the paper identifies and discusses the emerging cyber securities and reveals recent research and development to improve cyber securities. Moreover, the paper provides different definitions of identified emerging security technologies and their main features.
Additionally, the study provides real world examples of the identified emerging cyber securities. The study also explores government efforts in nurturing and support cyber securities. Finally, the paper discusses several benefits and drawbacks of the government efforts for the improvement of emerging cyber securities.
Emerging Technology for Cyber Security
Kuehn, & Mueller, (2014) identify the BBP (Bug Bounty Program) as one of the new emerging cyber-security program used to identify and address the bug vulnerability in the computer systems. Software vulnerability is a computer code flaw, which is known as a security bug that can compromise the computer security. Typically, vulnerabilities can occur due to an unintended design of mathematical errors. A bug can persist for a long time within an organizational computer system before it is discovered. Typically, the bug vulnerability allows unauthorized individual to intrude into, manipulate, and steal data from organizational information systems. A software code that allows this type of vulnerability is called exploit. In essence, vulnerability allows the software exploit in order to circumvent organizational security systems. Software engineering expert has presented various novel approaches to design and test software in order to enhance software drug free.
Kuehn, & Mueller, (2014) further point out that many organizations have developed a new generation cyber security program called BBP (Bug Bounty Program). The program is an emerging cyber-security realm that has translated to the emerging practice and norms in the cyber-security paradigm. The new security paradigms have implication in the security and reliability of the internet. The BBP is a bug challenges reward or VRP (vulnerability rewards programs) aimed to reward penetrators,...
(Bilge, & Dumitras, 2012). However, enhance cyber-security through monetary rewards from the BBP program is a new security development. Many software security vendors have incorporated the BBP program into their business objectives to enhance security platform within an IT environment. However, the efficacy of the BBP security platform is still under consideration. In the recent years, many online companies have experimented with BBPs to enhance their security systems.
Another emerging cyber-security is the security system to protect cloud computing. Sharma (2012) identifies the cloud computing, as one of the emerging technologies that many organizations are currently using to achieve their business objectives and increasing number of organizations are using the cloud computing because of its cost effectiveness. In other words, organizations are moving into the cloud to enjoy a significant cost saving, flexibility, and new collaborative models. Despite the benefits delivered by the cloud computing, the security systems for the cloud computing are different from other technologies. The Big Data also presents different security challenges to organizations. Big Data is more than bits and bytes, which are the features of ordinary data. Typically, Big Data is a new technology that requires a new security system.
Takahashi, Kadobayashi, & Fujiwara, (2010) also identify the cloud computing technology as a new emerging IT ( Information Technology). The authors define cloud computing as a model used to achieve a shared configuration of computing resources such as servers, network, storage and application. Typically, the benefit of a cloud computing is its massive scalability because it provides a superior and efficient user experience. For example, cloud computing such as Google Apps and Amazon Web Services are accessible through a web service or web browser API (application programming interface). Many organizations prefer using the cloud computing services because of its cost savings. Recently, the market size of cloud computing is growing rapidly. In 2009, organizations spent approximately $17 billion on Google cloud. However, the market increases to $44 billion in 2013 showing that the cloud computing will outpace the traditional IT spending in the next few years.
However, preserving security for a cloud computing requires an emerging cyber-security technologies since the application of cloud computing departs from the traditional computing system. Different emerging cyber securities have been developed to enhance security system of a cloud computing. A Warning Database is an emerging security for a cloud computing, which consists of a database that contain information on cyber-security warnings. Organizations can use the warning information in the database to implement countermeasures against cybersecuriuty risks.
In a cloud computing technology, a warning database is used to alert user about some security risks in the cloud computing. A CKB (Countermeasure Knowledge Base) is another emerging security system for cloud computing that accumulates information related to the assessment rules, checklist, scoring methodologies in order to evaluate security level of the cloud computing. For example, the CKB provides the information about the rules for the best practice of cloud computing. The CKB also provides the Protection and Detection Knowledge-Based used to accumulate knowledge for protecting and detecting security threats within the cloud-computing environment. For example, the Countermeasure Knowledge Database provides the rules and criteria for the implementation of IDS (intrusion detection system) and IPS (intrusion prevention system) signatures. Typically, the rules that should be followed for the implementation of signature are accumulated in the database. Despite the effectiveness of Countermeasure Knowledge-Based for the security measure of the cloud computing, the security platform is still at an initial stage of development. Its applicability is still limited within the cloud-computing environment.
Rabai, Jouini, Aissa, et al. (2013) also point that a cloud computing is an emerging computing paradigm and many organizations use the cloud computing because of its flexibility, economy of scale and convenience. Despite the benefits associated to the cloud computing, the new technology is inherent with security risks. For example, the cloud computing technology is exposed to threats such as virtual machine modification, Flooding attacks, Denial of service (DoS) attack, Data leakage or loss, traffic, account, and service hijacking, monitoring of user's virtual machine from other virtual machine.
Rabai, et al. (2013) identify "OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation)" (p 65) as risk-based planning technique for the cloud security system. The OCTAVE plan is based on the identification of the major security threats and development security strategies to thwart those risks.
Real-World Examples of the use of Emerging Cyber Security Technologies
In the United States and other part of the world, some organizations have started experimenting emerging cyber security technologies to enhance organizational security systems. In the case of the BBP (Bug Bounty Program), Microsoft has launched one of the emerging cyber security projects. The Microsoft launched a Bounty Program in 2013 offering a reward for the novel exploitation…
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware
S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a
Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on them. In essence,
Honeypot and Honeynet Emerging Technologies In the present IT environment, individuals and businesses are becoming more dependent an open network that includes the Internet where business transactions, government services and commercial activities are realized. However, the use of open network has led to the development of new information security issues and cyber threats that are being utilized by the cyber criminals. Thus, a mistrust in computer network technologies and telecommunications
Federal Plans NICE Plan Development and Research Challenge Future Plan This paper discusses what is referred to as the Federal Plan is for Cyber Security and Information Assurance (CSIA- R&D) Research and Development. Details of the federal government's plan will be discussed as well as what is expected and can be done about cyber security in the long-term. In this federal plan, the terms 'information assurance' and 'cyber security' refer to measures put in place to