100% (1)
Pages:
3 pages/≈825 words
Sources:
-1
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Americas National Security Technology Essay Research

Essay Instructions:

This papers needs to be on Americas National Security and how Cyber Security specifically relates.



It needs to transition from paragraph to paragraph using the information systems CIA Triad (confidentiality, integrity, and availability - in that exact order)



An Assertion is a stylistic approach or technique involving a strong declaration , a forceful or confident and positive statement regarding a belief or a fact. Often, it is without a proof or any support.



please Write a 3 Page Paper which includes separate cover page and reference page:

1. Introduction and Summary

2. History,Background and Context

3. Problem (Defined)

4. Discussion to relate point of view from sources used

5. Writer takes a position

6. Solution/s

7. Conclusion.



This individual paper will be combined with two papers from my other group members to form a comprehensive discussion and recommended solution to the contemporary issue facing the Army and nation.



Essay Sample Content Preview:
National Security and Cyber Space
Student’s Name
Institution Affiliation
Course Number and Name
Instructor’s Name
Date
Introduction and Summary
America has positioned itself as one of the most powerful nations on the planet. In order to protect these interests and the people of America, the country's security became a priority not just to leaders but to the civilians. National security has moved from physical attacks on civilians but has grown to include cyber and economic security. With the advent of the internet, information has become an important aspect of the American economy. Hackers, cybersecurity professionals, and information systems professionals are in a constant battle to protect the confidentiality, integrity, and availability of information. The country must have access to information about the whereabouts of criminals and state enemies who may perpetrate attacks on the Confidentiality, integrity, and availability of the country’s cyberspace. This essay will analyze America's cybersecurity systems in line with the CIA triad and national security.
History, Background and Context
National security involves the defense of a national, including the safety of its citizens and the state's economy. These aspects of the defense of a country are military protection and terrorist attacks, economic, food, and cybersecurity. After the second world war, the National Security Act was established that provides legislation on the country's defense strategies. Under this act, the departments are in charge of the national security, including the national security council, the national cybersecurity division, and the central intelligence agency. One of the core responsibilities of national security is identifying potential dangers and readying for the right response (Eastern Kentucky University n.d). Confidentiality, integrity, and availability is a model used to guide policies on information and cybersecurity. It is also used to identify problem areas and develop solutions in the area of information security. 
Problem
The advent of computers and the internet brought to the fore another form of threat to the country. These threats come in the form of coordinated attacks on the government to steal information, disrupt or stop essential service delivery. These attacks can be coordinated from anywhere in the world, making cybersecurity relatively difficult to secure. This is further aggravated by other factors like the difficulty of identifying and reducing vulnerabilities in cyber networks. The threats in information systems touch on the confidentiality integrity and availability of information over networks and physical infrastructure.  
Discussion
In matters of national security, confidentiality involves the privacy of information. They include measures taken to ensure that sensitive data is sent to the right person. Ways to ensure data confidentiality includes data encryption and two-factor authentications. Data sharing should be done carefully to avoid information getting to the wrong person. Some communication systems require double encryption. the CIA triad are generally consider...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!