Introduction
The developments of information and communication technologies (ICT) in the past decades have resulted in the transformation of the global society into a virtual one. The United States and the world, in general, have been digitized, contributing to growth in every aspect of people’s lives. Consequently, the integrity of ICTs is imperative if America is to succeed in the evolving world without which no benefits will be realized. Unfortunately, most of the information technology innovations have prioritized the benefits regarding convenience, costs, and efficiency but given little attention to security. The presence of the internet and smart systems has opened up numerous national threats which can be exploited remotely. As a result, the federal government with the help of the Cybersecurity and Infrastructure Security Agency has put in place strategies and policies to protect the country from ICT-related national threats.
National Cyberthreats
The potential challenges to the United States’ cyberspace come in various forms and one of them results from cybercriminals. It is important to note that cyber-related crimes can only be conducted with the help of ICT gadgets, which can act as instruments of crime and targets at the same time. Examples of such malicious behavior include designing and sharing malware to destroy data, network activities, or hack systems to steal information (Mok, 2017). Moreover, traditional crimes have been made easy with the help of the internet because thieves do not have to be at the scene of a crime physically to steal. The majority of cybercrimes in the United States which are usually fraud cases are financially motivated and are notably conducted by Russian and Chinese criminal groups. Additionally, the nature of the internet world makes it difficult to know if the perpetrators are within the country or from other parts of the world.
State and state-sponsored threats are the other group of national security challenges facing the U.S. This is a common illegal activity between governments normally in a conflict where one country sponsors a criminal group to penetrate the other nation’s information network, in this case, America for technological, diplomatic, political, or commercial advantage. Additionally, the enemy’s main target is always defense, energy, telecommunications, and financial industries (Mok, 2017). The impacts of these state-sponsored cyber-attacks vary depending on the intentions. Although the U.S. government continues to put in place various measures such as the encryption of its data, the country still continues to face cyber-threats.
The other source of cyber-threat comes from terrorists who unlike cybercriminals and state-sponsored cyber-attackers are ready to take responsibility for their actions. These groups have sworn to constantly damage America’s cyberspace and all related interests. Of all established countries in America and Europe, the U.S faces more cyber-terrorism threats (Mok, 2017). Moreover, there have been cases of bomb attacks that have been triggered remotely with the help of information technology. It is difficult to detect such devices since most of them are complex and homemade. Terrorists’ intentions are to cause havoc and they always use any cyber means possible to cause death and destruction in America.
Finally, there are groups of individuals known as hacktivists who use computers and related technology to convey civil disobedience. These internal criminals who masquerade in the name of activism are usually issue-focused and decentralized. These people who have a vigilante mentality identify a target who can be a politician with a bad history and then harm them in most cases by exposing their wrongdoings (Mok, 2017). Although most of hactivsits’ behavior are only disruptive in nature, there are those who have managed to cause long-lasting damages on their targets.
Vulnerabilities within the National Cyberspace
Vulnerabilities in cybersecurity are areas of weakness within the networks that can be exploited by adversaries. For instance, the ever-evolving range of devices and related technologies provide loop holes for both internal and external attackers. The existence of the “Internet of Things” provides opportunities for criminals who have the capability of causing serious physical damages to American citizens (Cristea, 2020). Moreover, the integration of ICT into different industries such as agriculture, mining, energy, and aviation has created the possibility of interference from hackers to tamper with related processes and devices, a problem that was not there before the internet. Several departments within the federal government are interconnected with the help of computer networks and this is a source of vulnerability since different sectors can be attacked by a single malware.
Additionally, the lack of properly trained and skilled personnel working within the federal government’s network system also places the country at risk. Most of the staff members particularly those working at the state and county levels do not understand the elements of cybersecurity and do not understand their responsibilities in minimizing threats. Consequently, national and international cybercriminals will always use such individuals as loopholes since they lack formal training in information security (Cristea, 2020). Continuous training on matters pertaining to information technology and protection of systems is imperative if the United States is to cope with developments in the cyber industry, particularly those associated with risks and vulnerabilities.
Finally, the presence of hacking resources such as tutorials all over the internet is also another source of vulnerability to the national government’s network system. Individuals with ill motives can easily access materials which shape them into dangerous criminals. Furthermore, the fact that it is impossible to monitor or restrict the use of the internet in the country as directed by the law means the government can do so little about groups that chose to train themselves and participate in attacks online (Cristea, 2020). It is, therefore, imperative that everyone working with the government recognize how much their confidential details are exposed on the internet to avoid vulnerabilities and cyber-attacks.
Federal Government Strategies in Combating Cyberthreats and Vulnerabilities
The best solution to achieving top-most cyber security within the country’s network system is through defense. This strategy ensures that all data and network systems in the United States, either from the public or private sectors are safe from any related attacks. However, it is necessary to note that it is quite impossible to address every threat the same way the government cannot protect its citizens from all criminal activities. As a result, the government has to work closely with academicians, businesspeople, and all citizens to create and enforce defense layers that will protect the nation’s most valuable assets and minimize incidences of cyber-attacks (Senol & Karacuha, 2020). The Cybersecurity and Infrastructure Security Agency (CISA) is responsible for advising the federal government on cyber defense and to ensure the country is ready to respond swiftly to cyber incidences.
First, it is necessary to have an active cyber defense tenet that introduces and enforces security standards, which strengthen all federal computer systems. In order to effectively execute this plan, it is essential that the U.S. government hires cyber security analysts who have robust understanding of possible threats to national and local networks and implement measures that will combat such threats. The government is using a large scale approach in implementing the defense protocol. Consequently, the exceptional expertise and capabilities of the mentioned professionals are used in influencing positive changes in the entire United States’ cyberspace. CISA also has a role to play in ensuring only the best cyber analysts are employed for the job.
Secondly, the internet is the source of numerous vulnerabilities and threats, the federal government has focused on developing a more secure cyberspace. The evolving technology not only acts as a platform for criminal activities but also gives America a chance to implement innovations that will secure online transactions, both public and private from all adversaries (Senol & Karacuha, 2020). Consequently, security protocols are included in the hardware and software right from the manufacturer to ensure maximum security to the user, particularly individuals in government agencies. The end goal of securing the internet is for all citizens and not only America’s administration to feel safe when using gadgets within the U.S. network.
CISA Cybersecurity Resources
CISA is an independent within the U.S. federal agency that operates under Department of Homeland Security. Consequently, one of its main roles is to organize for activities meant to enhance the functionalities of the National Protection and Programs Directorate. CISA understands that to achieve general cyber security of the United States, individual citizens and organizations have to be equipped with the necessary materials. For instance, CISA offers telework resources that brings partners from various industries and the government together in an effort to enhance infrastructure security (CISA, n.d.).
These materials help teleworkers in various platforms to work safely even in remote locations. Secondly, the agency offers a combination of cybersecurity assessments capable enough to analyze external dependencies and operational resilience crucial in building a robust and safe national network. Finally and most importantly, CISA supervises mitigation strategies against cyber risks with the potential of affecting America’s critical infrastructure. Most countries in the United States have actively integrated internet and ICTs in their operations but spent so little in investing on security measures (CISA, n.d.). As a result, CISA acts as the federal government’s advisor in identifying risks to all systems, networks, and assets from public and private sectors to ensure they are secure.
National Cybersecurity Protection System (NCPS)
Although the three branches of the U.S. federal government are all considered equal, the executive acts as the head because the president is the country’s representative. Consequently, any security challenges affected this branch should be of the highest priority. Therefore, through the National Cybersecurity Protection System (NCPS), CISA is capable of detecting and preventing intrusions, conducting analytics and sharing information securely (CISA, n.d.). All threats that might affect the Federal Civilian Executive Branch are mitigated appropriately. However, it is important to note that the effectiveness of this system requires close collaboration among cross-federal stakeholders who contribute towards defending the underlying networks. The association is a source of important cyber threat information that improves the government’s decision-making in the event of security risks.
Conclusion
Although the invention of the cyberspace has introduced numerous benefits to individuals, the private sector, and the government, it also marked the beginning of anonymous criminals. There are numerous threats and vulnerabilities in the internet such as cyber-terrorism and state-sponsored hacking that places the American government at risk of cyber-attacks. Consequently, with the help of CISA the United States has managed to enforce measures among federal agencies and its citizens to protect the country from cybercriminals. However, the government has to be vigilant and keep improving on it strategies to match the evolving technologies which are sources of new approaches to cyber-attacks.
References
CISA Cybersecurity Resources. CISA. Web.
Cristea, L. (2020). Current security threats in the national and international context. Journal of Accounting and Management Information Systems, 19(2), 351-378. Web.
Mok, K. (2017). Cyber threat or cyber threat inflation? – Assessing the risk to U.S. National Security. Small Wars Journal. Web.
National Cybersecurity Protection System. CISA. Web.
Senol, M., & Karacuha, E. Creating and implementing an effective and deterrent national cyber security strategy. Journal of Engineering, 2020, 1-19. Web.