Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are protected against unauthorized modification of network systems. Confidentiality is provided through protecting users against unauthorized access to their network systems and information by other people. Availability, on the other hand, ensures that users have adequate time and access to their systems and networks (Knapp, 2009).
With time, filtering devices will continue to improve in terms of precision and accuracy in order to tackle the issue of ethics in cyberspace. Public-private collaborations to enhance technology will be a big step towards providing cyber security and information assurance. There is also a need to identify the most dangerous classes of information assurance threats and cyber security (Parker, 1998). These findings should then be used to develop and put into practice coordinated effort focusing on key research needs. These needs will take time to evolve, but it will be a starting point for the government to curb issues affecting cyber security (Parker, 1998).
But as much as the filters improve, issues of internet security continue to intensify due to the dynamic nature of the internet (Spinello, 2011). This is mainly attributed to complex IT networks, expanding wireless computers connectivity, and the dynamic telecommunication industry. Therefore, ensuring cyber security and information assurance might take a much longer time than expected to be realized.
References
Knapp K.J. (2009). Cyber security and global information assurance: Threat analysis and response solutions. Hershey, PA: IGI Global.
Parker D. B. (1998). Fighting computer crime. New York, NY: John Wiley & Sons.
Sara, B. (2008). Gift of fire: Social, legal, and ethical issues for computing and internet (3rd Ed.). Lebanon, Indiana, U.S.A: Prentice Hall.
Spinello, R. (2011). CyberEthics: Morality and law in cyberspace (4th Ed.). Sudbury, MA: Jones and Bartlett Publishers.