Central Washington University Cybercrime Response

Good evening, Class,

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The United States of America and the leaders of this world leading power learned long ago that a massive military entity is only a piece of the necessities to grow to a world leading super power and to maintain that power. Within the past few decades the world has seen a total evolution to a digital platform in the form of trade, media, intelligence, and warfare. As the cyber world has opened an entire new realm into trade and information sharing capabilities it has also brought forth security concerns that grow and evolve daily.

As the corporate America is the heart around the economic flow of this nation protecting corporate assets has been brought to the forefront right beside the physical threats that exist within keeping the homeland safe. With the modern world being rebuilt around the cyber realm new challenges grow and grow in protecting the trade and all mechanics involved in trade not only domestically but worldwide. The courts of America are facing judgements never before seen, with the majority of the verdicts putting a massive responsibility on the corporations themselves in the art of protecting themselves (Passman, 2016). However doing so is a dangerous action mainly in part because the nation should invest and attract these corporations in order to keep the economy a powerhouse.

Beyond implementing improved physical and electrical security access precautions across the corporate interface to prevent unauthorized interference, I would look at evolving the cybersecurity capabilities the nation has. I feel as if the nation is moving to slow in the cybersecurity field compared to the hacker’s abilities that infect the world from all over. Whether hackers and intruders be operating from Chinese backed governments or from even domestic ones, the United States lacks cyber knowledge and abilities. I find the best course of action is to redirect defense spending to cybersecurity assets to not only protect the nation’s corporations but the nation’s assets in general. Unfortunately, the greatest challenge with this action is that cyber capabilities are changing daily. Funding should be redirected to not only stabilize a compromised system but to prevent the digital attacks on our nation’s assets.

Passman, P. (2016). WIPO. Eight steps to secure trade secrets. Retrieved from

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

https://www.wipo.int/wipo_magazine/en/2016/01/article_0006.html

Reply to Thread

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER