Government Incentives To Invest In Cybersecurity Essay

PAGES
3
WORDS
911
Cite

Cyber Security Conceptual or Substantive Assumptions

Cybersecurity is fast approaching a place where it is becoming a form of currency with consumers and clients. It is only in the past decade that digital environments became a normal and typical way to transact business. Consumers and clients quite rapidly adapted to the convenience of conducting business and managing their finances in online environments. Certainly, there were -- and are -- people who did not fully trust digital commerce, but consumers choices narrowed to a point where non-digital transactions were constrained. For instance, customers of banks were funneled into online transactions as some banks gave up a bricks-and-mortar presence. Consumers who wanted more choices when making everyday purchases found meager goods on the shelves but an abundance of inventory online. Patients learned to access their medical records and test results online, and many medical practitioners now keep online office hours for emergency communications and treatment advice. All manner of business and personal transactions have come to rely on the functions and services found in digital environments. One overarching attribute is necessary for this new way of accomplishing economic transactions: that attribute is trust.

Trust between the public and private companies is fundamental to sustaining the way business is conducted today, and for enabling technological innovations to continue...

...

Yet, the essential ingredient of trust has been seriously eroded over the past several years as consumers and business have experienced the shock of expansive and pervasive cybercrime. In much the same way that the exchange of paper money in commerce is based on trust, and keeps economies functioning in predictable and understandable ways, commercial transactions that depend on secure and expedient information technology pivot on the notion of trust. Cybercrime impacts the bottom line of businesses in terms of the costs to restore secure IT functioning and pay reparations as required. But cybercrime also impacts the reputation of businesses, which can result in long-term losses from bleeding brand equity and diminished consumer loyalty. In the long run, it is likely that businesses will pay less upfront to ensure the cybersecurity of their systems than they will to repair damages resulting from cybercrime. The idea of businesses benefitting from expenditures to improve cybersecurity is neither unique nor new; however, a number of prophylactic commercial approaches for dealing with cybercrime are new -- and they may well capture the imagination of businesses concerned with meeting the high cost of cybersecurity out of their own coffers.
Several years ago the Internet Security Alliance (ISA) Cyber Security organization proposed a constellation of potential market incentives to evoke…

Sources Used in Documents:

References

Internet Security Alliance (ISA). (2014). Social Contract 2.0: A 21st Century Program for Effective Cyber Security. Retrieved from http://www.isalliance.org/social-contract/

Daniel, M. (2013, August 6). Incentives to support adoption of the cybersecurity framework. Retreived from http://www.whitehouse.gov/blog/2013/08/06/incentives-support-adoption-cybersecurity-framework


Cite this Document:

"Government Incentives To Invest In Cybersecurity" (2015, March 02) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/government-incentives-to-invest-in-cybersecurity-2149909

"Government Incentives To Invest In Cybersecurity" 02 March 2015. Web.19 April. 2024. <
https://www.paperdue.com/essay/government-incentives-to-invest-in-cybersecurity-2149909>

"Government Incentives To Invest In Cybersecurity", 02 March 2015, Accessed.19 April. 2024,
https://www.paperdue.com/essay/government-incentives-to-invest-in-cybersecurity-2149909

Related Documents
Laws on Cyber Crimes
PAGES 10 WORDS 2997

Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On

(White House, 2003) II. The NATIONAL STRATEGY for SECURE CYBERSPACE The National Strategy for Secure Cyberspace strategic plan states that its strategic objectives are "consistent with the National Strategy for Homeland Security' and that those objectives include: (1) prevention of cyber attacks against America's critical infrastructure; (2) reduction of national vulnerability to cyber attacks and; (3) minimization of damage and recovery time from cyber attacks that do occur. (White House, 2003)

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Cyber Attacks on Financial Institutions Carmalia Davis The finance industry has continued to receive more targeted and sophisticated cyber attacks from criminals. These criminals often email phishing campaigns to customers which have remained the most successful methods of targeting financial institutions. New innovations in banking, like online and mobile banking, have continued to create new vulnerabilities for cyber thieves. To minimize the efficiency of these attacks, banks have devised improved communication

Financial fraud refers to the act of deceitfully and illegally taking money or property for personal gain. It is an ever-evolving problem with serious implications for individuals, businesses, and the economy at large. The variety of fraudulent activities includes, but is not limited to, embezzlement, forgery, Ponzi schemes, insurance fraud, and identity theft. In the era of globalization and technological advancement, the landscape of financial fraud has broadened, with fraudsters

Cyber Warfare
PAGES 10 WORDS 2636

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the