Investment Banking

IT Web Essay on National Initiative of Cyber Security Education

National Initiative of Cyber Security Education

The ‘‘National Initiative of Cyber security Education’’ (NICE), is a representation of a national strategy towards enhancing cyber security in non-governmental and governmental infrastructure in the United States of America. The initiative aims at achieving this goal by expediting the process of ensuring easy accessibility of quality education and training of workers to help enhance sound practices, skills, cyber behavior and adequate knowledge in each segment of US population including students from kindergarten, civilians, workforce and students in post graduate education level (United Nations, 2010).

Presently the initiative makes up more than 20 Federal industries and departments. The Comprehensive National Cyber Security Initiative of 2008, led to the growth of NICE. This is an initiative that ensures engagement, coordination, sustainability and focus on all cyber security systems. Many NICE activities are ongoing and they engage different groups of stakeholders in creating a forum for transfer and sharing of information. What’s more, the main purpose of NICE is to create a workforce with people who are technologically skilled, cyber savvy and effective in handling challenges as well as cyber threats.

The Value of the Nice Framework

The NICE framework was created to provide awareness and understanding on cyber security. The core value of the framework is generated from its definition of cyber security, standardized practices use and terms as a way of promoting or enhancing training, education as well as retention of qualified staff across the country (Winterfeld & Andress, 2013).

The framework designing process also involved the use of ‘Specialty areas’ and ‘Categories’ to similar group tasks. The categories served as essential infrastructure for group related specialty areas and framework. Each specialty area included knowledge, skills and specific tasks. Therefore, all specialty areas within one category possess different features or similarities.

The framework also describes different security responsibilities regardless of the structure of an organization, organizations and job descriptions among other settlements. Under NICE framework, it is therefore possible for a person to carry out one or more tasks in different specialty areas or within one area. Similarly, some of the categories of framework include operation, investigation, analysis, data collection, protection, defense, maintenance, support and provision (Winterfeld & Andress, 2013).

The Significance of the National Initiative for Cyber Security Education Initiative

NICE is a very crucial initiative as demonstrated in the following cases. First of all, the US president identified cyber security as a challenge to economic and national security. Secondly, the US government has not been able to adequately prepare to meet and manage challenges brought about by cyber-attacks and threats.

Thirdly, the country doesn’t have enough knowledgeable and skilled workforces that can help anticipate, detect, fight and defeat cyber-attacks and threats posing challenges to the digital infrastructure in the country. For this reason, NICE is very essential in recruiting, creating and retaining highly skilled employees (United Nations, 2010).

The expected outcomes of this initiative

National initiative of Cyber security education implementation is expected to offer a number of positive results. First of all, the initiative will help create a sustainable, functional and continuous cyber security program for education to target many segments of the nation to ensure correct use of sound cyber practices. This will in turn help to enhance and promote overall US security.

Secondly, NICE will ensure secure and safe mechanisms. By conducting a national awareness program for cultural change aimed at making the right use of cyber practices. NICE will therefore result in more effective solutions for technical problems and to help produce learned users who will also employ the right practices when utilizing cyberspace.

By implementing all principles, NICE will be able to ensure efficient and effective functioning of cyber systems, which in the end, helps to enhance current and future cyber systems security (Winterfeld & Andress, 2013).

How Organizations can implement the NICE framework to prevent internal and external attacks

Nearly all organizations and businesses depend on information technology for its different operations. The increased dependence on IT makes avoidance and combat of internal as well as external attacks a priority (Bullock et al, 2013). To help minimize such risks, organizations also need to maintain and implement NICE framework. Implementation of the framework involves risk management, risk analysis and sanction policy.

The organization also carries out analysis on risks the systems are vulnerable to and then make vital decisions on how they can be managed and addressed. The organizations must also ensure proper sanction measures are put in place to ensure every employee realizes the penalties of not adhering to the requirements and policies of NICE.

Additionally, the organizations must always ensure highest professional certification levels for enhanced protection against threats, attacks and to quickly identify vulnerabilities.

How the NICE structure handles legal and ethical subjects in the sphere of information security

Nice framework addresses legal and ethical issues in information security area by offering a means of training, educating, recruiting and developing a qualified workforce in corporate and governmental systems. Highly trained personnel are in a position to protect all intellectual properties created by organizations and individuals from irrational interference. This is based on the fact that NICE framework ensures employees are in a position to apply only sound practice in all cyberspace systems.

Additionally, the application of NICE framework requires that companies should meet all business expectations and legal requirements (Bullock et al, 2013). Therefore, the framework addresses moral and ethical information security issues.

 

References

Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2013). Homeland security: The essentials.

Waltham, MA: Butterworth-Heinemann.

United States Government. (2010). Budget of the U.S. Government, fiscal year 2012. Washington, DC: For

sale by the Supt. of Docs., U.S. G.P.O.

Winterfeld, S., & Andress, J. (2013). The Basics of Cyber Warfare: Understanding the

Fundamentals of Cyber Warfare in Theory and Practice. Rockland, MA: Elsevier Science.

Posted by:

admin

Related articles

list of articles

Categories

RSS RSS FEEDS

  • Sample Essay on Allosteric Regulation May 10, 2016
    Allosteric Regulation Allosteric regulation is a process that takes place when regulatory triggers, like the binding of a small molecule inhibitor, takes place in another location other than the active site of the protein. Many proteins undergo this kind of regulation and show various mechanisms of allosteric control. Because of this regulation, the active site […]
    admin

ARCHIVES

Latest News From Blog

Check out Our Blog's assignment samples and tips on how to Write Assigments
Essay sample on the Effects of Cold War on Soviet Union..

Effects of Cold War on Soviet Union The Soviet Union was one of the main participants in the Cold War. It was engaged in the war with the USA and - See more

Essay sample on Effects of Cold War on Asia

Effects of Cold War on Asia Tensions of the Cold War began shifting from Europe to Asia in 1949 when Mao Zeodong proclaimed the birth of the ...Read More

Sample Essay on United Kingdom Healthcare System

United Kingdom Healthcare System United Kingdom healthcare system, also known as the National Health Service was established...Read More

Back to Top