Task:Write a research essay based on a problem and solution essay model structure
Topic: Choose a topic of interest that is related to your further studies at university. Your teacher will help you with this. Please see the EAP2 ‘Sample topics’ guide for some ideas.
Essay writing process
In this cyber security essay the main focus is given on how can Indian government organizations respond to the cybercrime of today's digital environment. We are providing some sample solutions of cyber security essays, to help you in building up a concept plan in drafting the solution yourselves. In present scenario, it is impossible to imagine a world where computers and internet are not available. Ciolan asked, “Is cyber security the most important security issue of our century?” (Ciolan, 2014).Answer to this, the personal lives of human beings is completely dependent upon these new technologies. Even the financial transactions, the businesses, the global economy and the communications all are dependent upon ICT systems to carry out. Both the public as well as the private domains are effectively using the global data networks for performing their business of hundreds of billions of dollars on daily basis (Turban, King, Lee, Liang & Turban, 2015). The government and public institutions are much dependent upon these technologies as they offer critical health services, education and social services by the means of ICT networks only. And such dependency is more likely to increase at a rapid rate in the coming future. These technologies and their usage is not providing only benefits but there are several cost associated with them. With every technology or device, cyberspace possesses its vulnerabilities which can be used by the personal, individual, political ideological or economic gains (Laudon & Laudon, 2016). ‘The cyber-attacks vary from the various unlawful low level personal crimes such as hacking to the several actions of non-state actors such as terrorist and criminals to the well-organized cyber-attacks’ In this cyber security essay a detailed analysis of cyber threats in India are being discussed and some cyber tools are suggested to respond back.
There is a terrible and substantial problem of cyber-attack in India today. The government and businesses and also the regular citizens are being affected by the problem. There is a need to have adequate cyber security tools and ways to respond back to these issues and problems of cyber-attacks.
In this cyber security essay the below research problems are being addressed.
How can Indian government organizations respond to the cybercrime of today's digital environment?
Solution to Problem 1: Cyber security the most important security issue in India
Cyber security refers to the data protection, system protection and also the data protection from the deletion, alteration and corruption like aspects.’ (Ciolan, 2014) Cyberspace information integrity is one of the vital aspects to both government and businesses and also for the regular citizens. The one of the primary challenges in the digital world is defining a coherent and clear cyber security policy which can prevent the citizens, businesses and the government from the complex large scale cyber-attack against the use of ICT (Turban, King, Lee, Liang & Turban, 2015). Few of the major cyber-attacks which had taken place in the past have demonstrated the possibility of undermining attacks on the information structure of the government. It has been suggested that the cyber threats are the most serious national security and economic security challenge being faced by the country (Ciolan, 2014). The economic prosperity of India in the 21st century is highly dependent upon the cyber security. Therefore there has been called an investigation of the role of the Federal government in securing and protecting the Indian information and communication grid (Bossler, Holt & Seigfried-Spellar, 2017).
Solution to Problem 2: Cyber-attacks is terribly impacting the businesses, general public lives and government organizations
Till the year 2007 the issue of cyber security was not considered as a Priority for the Government and the policy makers and therefore a number of the debates were more speculative rather than fact-based (Shackelford & Craig, 2014). But in past few years, cyber security has occurred as a strategic topic which fetched the attention of government, the policy makers, the diplomats, IT experts, military leaders and the intelligence community in order to find the solutions to the various cyberspace threats. Ciolan suggested, “As software becomes more complex, there are more opportunities for attack.” (Ciolan, 2014). Cyber security is not only the protection of the systems but the data is also protected and saved from the unauthorized dissemination and access. Because of the increasing public attention towards cyber threat, in present moment cyber security is considered as the most vital policy for the government of India (Shackelford & Craig, 2014). By considering the current policy framework and the current national legislation in respect with the cyber-attacks, it has been evident that because of the changing nature of the cybercrimes, the national security policy is a must (Turban, King, Lee, Liang & Turban, 2015).
Solution to Problem 3: Ineffectiveness in resolving cyber-attacks and issuesFor enhancing the security of the communication and information infrastructure of India by the means of proactive action and sound collaboration, there is a need to develop a computer emergency response team. Such team will help in collecting, disseminating and analyzing the information on cyber incidents as well as can help in forecasting and alerting the cyber security incidents. They can also suggest the emergency measures which can be taken for handling the various cyber security attacks (Shackelford & Craig, 2014). Such kind of response team helps in coordination of cyber-attacks response activities as well as issuing the guidelines, vulnerability notes, advisories and white papers in relation with the prevention, response, procedures, information security practices and reporting of the cyber-attacks (Ciolan, 2014).
For creating awareness in the various business organisations as well as government, there is a need to develop and implement an effective IT security policy which will be based upon the best practices in relation with the protection of the infrastructure (Shackelford & Craig, 2014). For this there is a need to implement a security insurance program by the government. To respond to the cybercrimes of today today's digital world the Indian government organisations must have the cyber security research and development activities (Johnson, 2016). These activities will help in the following areas such as cryptanalysis, cryptography, system security, network security, security architecture, assurance technologies, vulnerability analysis and vulnerability detection services, forensics surveillance and monitoring (Ciolan, 2014). Under the Information Technology Act 2000, the Government of India must have several development and alterations which can deal with the new forms of cybercrimes such as e-commerce frauds, data leakage, and breach of confidentiality, cyber terrorism, video voyeurism and publicizing sexually explicit content in the electronic form. The Indian government organisation must take the initiative to create more awareness on cybercrimes and must ensure that there is Introduction of advanced training programs with much emphasis upon the current trends in the use of Cyber forensic tools (Chaturvedi, Narain Singh, Prasad Gupta & Bhattacharya, 2014).
There must be setting up of cyber labs for setting up and managing the private public partnership model for investigating and registering various kinds of Cybercrimes with the help of police department and also training must be offered to the prosecutor's police officers Bank official’s military police and others on cybercrime and cyber-attacks. In the modern era the role and significance of media has been occurred as a vital tool (Ciolan, 2014). International Security and interest related matters media must follow our nationalistic line and help in reporting the various cyber-attacks so that the rate and incidents of Cybercrimes can be reduced and higher attention can be paid by the government authorities. The Indian government can start a program for turning the nation into a digital economy. It would be a series of initiatives where there will be an introduction of digital locker which can eliminate the need of individuals for carrying out the hard copies of the documents which will be issued by the government so that there can be elimination of cyber-attacks related to breach of documents and information (Ciolan, 2014).
Hence in this cyber security essay we can infer that the Internet and digital technology has brought the users with a number of benefits in political, social, communication, information, cultural and economic sectors. But at the same time it is very harmful and dangerous where through the place of identity theft, denial-of-service attacks, malware, viruses, botnet and other cyber-attack or cyber perpetrators can put the security of the Government and the citizens in danger. Therefore there is a vast need that effective tools and strategies must be used by the Indian government organisation for responding to the cyber-crime of today's digital world. To protect the government organisation, the citizens, the general public and the businesses there is a need to have sound strategies, cyber security practices.
Bossler, A., Holt, T. J., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.
Chaturvedi, M., Narain Singh, A., Prasad Gupta, M., & Bhattacharya, J. (2014). Analyses of issues of information security in Indian context. Transforming Government: People, Process and Policy, 8(3), 374-397.
Ciolan, I. M. (2014). Defining Cybersecurity As The Security Issue of The Twenty First Century. A Constructivist Approach. Revista de Administratie Publica si Politici Sociale, 12(1), 40.
Johnson, M. (2016). Cyber crime, security and digital intelligence. Routledge.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education India.
Shackelford, S. J., & Craig, A. N. (2014). Beyond the new digital divide: Analyzing the evolving role of national governments in internet governance and enhancing cybersecurity. Stan. J. Int'l L., 50, 119.
Turban, E., King, D., Lee, J. K., Liang, T. P., & Turban, D. C. (2015). Electronic commerce: A managerial and social networks perspective. Springer.