Global Challenges of Securing the Global Cyber Space

Cyberspace can be defined as the ubiquitous space existing in relation to the internet and composes of the internet, social networks, and other infrastructure. Cyberspace has promoted connectivity in the world bringing people together to discuss and share ideas, facts, and other content regardless of the distance of separation. The research sought to answer the question, what are the challenges of securing the global cyberspace in the 21st century?  This research helps to establish the obstacles faced when trying to secure the global cyberspace. Studies have shown that the internet is growing at a high rate and transforming the way people interact as a society and do business at the global level. People are also over-depending on information posted on the internet as people are always connected despite the location. Controlling such interaction is a great challenge and users may become vulnerable to threats. Putting various measures will help in reducing cyber attacks in the world and enhance security of internet users. Cyber offenders mostly trade online in personal details including passports, credit card, and driving licenses details in forums such as carding and online market places. Tracing of the offenders can be concentrated in sites that are expected to be prone to attacks by criminals and fixed


Introduction


Cyberspace can be defined as the ubiquitous space existing in relation to the internet and comprises of the internet, social networks, and other infrastructure. Cyberspace has promoted connectivity in the world bringing people together to discuss and share ideas, facts, and other content regardless of the distance of separation. The connectivity in the cyberspace has made sharing of data possible and increased storage of information online (Li et al., 2015). Securing the cyberspace entails physical level security, network level, application level, and improvement in cyberspace management. However, global connectivity has exposed the cyberspace to various forms of harm, interfering with the security and privacy in the cyberspace (Li et al., 2015). For instance, cybercrime has increased the level of incredibly involving computers and other digital devices. Cyber threat has increased significantly due to the existence of large, powerful groups of vigilante hackers (Shamsi, Zeadally, " Nasir, 2016). Securing of the cyberspace can help to reduce misuse of information as well as incidences such as cyber bullying. However, securing the cyberspace has major challenges due to the misuse of the internet. The research sought to answer the question, what are the global challenges of securing the cyberspace in the 21st


century?  This research helps to establish the obstacles faced when trying to secure the global cyberspace. Understanding the challenges will help policy-makers, institution heads, and other bodies to promote security of content and control of materials accessed by online users.


The research evaluated the standards for security of cyberspace and the challenges encountered. The methodology involved quantitative analysis of literature on possible challenges that may be experienced by individuals, organizations, governments, and other entities as they fight against the cyberspace threats. The study found out that securing the global cyberspace has many challenges due to different laws that govern individual countries. Coming up with a universal law is very difficult due to differing views. The study concluded that securing the cyberspace is challenging but can be achieved through setting up a commission with representatives from different nations to help in its regulation and usage.


Findings


Various sources were analyzed to establish the challenges experienced in securing the global cyber space. According to a study by Kremer and Müller (2013), political and ideological differences of various states and nations have affected the international relations in the cyberspace. Although many countries are willing to work closely to deal with the cyberspace threat, mutual mistrust and fear of espionage especially where defense systems need to be linked hinders any attempts. No valid international agreement to establish a legal definition of cyberspace aggression exists. Thus, global cyber crime law is not clearly defined making it difficult to fight against internet crime. Spending on cybersecurity is also not given priority in many countries. Fighting cybercrime is quite expensive and some states may find it  unnecessary to allocate enough funds to curb the vice while other sectors such as poverty eradication are given first priority. Countries such as the US invest heavily on defending their cyberspace. Below is a graph showing the country’s spending.


Figure 1: Spending on cybersecurity in the United States from 2010 to 2018 (in billion U.S. dollars)


From https://www.statista.com/statistics/615450/cybersecurity-spending-in-the-us/


Developing technology is also a challenge according to this research as it increases ways of accessing information by different groups and people every day. According to Levesque, Walsh and Whyte (2015), industry leadership lacks in various sectors thus securing the cyberspace becomes difficult. The factors that make it hard to achieve security of the cyberspace include complexity of the space, accelerated change in technology, and internal capacity of countries. For instance, Canada tries to secure its cyberspace but cannot achieve this goal without involving external expertise from other nations. The internet is growing at a high rate and transforming the way people interact as a society and do business at the global level. People are also over-depending on information posted on the internet as they are always connected despite the location. Controlling such interaction is a great challenge and users may become vulnerable to threats. The defender has the task of stopping all entry vectors into a network but the attacker simply needs to find one way into a network. This implies that defending the global cyberspace from attack is a challenging task. According to study by McGuire and Dowling (2013), about 3 percent of adult users of internet experienced negative online experiences in 2011/2012.  In England and Wales internet users reported to have experience a problem with viruses was 31 percent, loss of money 3 percent, and threats 2 percent. Businesses also reported experiences such as the manufacturing that recorded a 4 percent in hacking crimes, 11 percent computer virus, and 12 percent all online crime.


Another major challenge is development of the methods, data, and tools required to support cyber policy decision-makers as the study by Czosseck and Geers (2009) showed. The tools must address issues related to governance, civil liberties, and legal issues to ensure prevention of cybercrime. However, for several countries dealing with cyber laws is quite difficult especially cyber espionage that may need spying on communication, information, and internet activities of the citizens. Under reporting of cyber crimes by businesses and the public leads to challenges in fighting the vice. Other crimes recorded high number of offences compared to cyberspace yet it is prone to abuse. On the global scale, online shopping sites were the most targeted for attacks at 25 percent while backs closely followed at 23 percent (Czosseck and Geers, 2009). Other sites include gaming 20 percent, telecommunications sector 53 percent, e-commerce 50 percent, and online retail sector 43 percent. From these findings, it is evident that cyber attacks are common in the world although the greatest challenge is that the data available is quite limited.  Countries such as the US are prone to attacks especially the US, which in 2012 led in the number of hacks in the third quarter. This was about 21 percent of all global attacks followed by Russia at 19.1 percent and China, 16.3 percent (Czosseck " Geers, 2009). Tracing some crimes is quite challenging especially getting to the origins of the unauthorized network access.


Figure 2: Asia Pacific Cyber security Market by Application, 2014 – 2024 (USD Billion)


From http://www.abnewswire.com/pressreleases/cyber-security-market-size-to-reach-20551-billion-by-2024-grand-view-research-inc_77176.html


Conclusion


The increased cyber-terrorism and crime requires organization of systematic education and strengthening operational military, police, intelligence, as well as civil centers for defense from cyber attacks. The future fight against cybercrime should include establishing an effective defense system aimed at prevention of international crime and promotion cooperation in fighting cyber crime can work to overcome challenges. The research also found out that depending on networked computers some countries such as the USA are exposed to possible attacks. Thus, there is need to stabilize access to electronic information and services for different economies since it will promote conducting of businesses, delivery of goods and services, and promotion of uninterrupted operations in the global marketplace. National cyber power considers three factors, which include cyber capabilities, dependence on cyber networks, and the ability of a country to control and defend its cyberspace. A single entity cannot fight cybercrime thus; states should come together and establish rules that guide on internet use. Prevention of massive disruption from cyber attacks is necessary thus states need to cooperate, which can be achieved by offering education on cyber security in all parts of the world. Strengthening of cyber laws to ensure that attackers are penalized once they break them is also important. In addition, there is need to always advance technology through increased espionage and ensure of software verification can work to reduce cybercrime. Putting various measures will help in reducing cyber attacks in the world and enhance security of internet users. Cyber offenders mostly trade online in personal details including passports, credit card, and driving licenses details in forums such as carding and online market places. Tracing of the offenders can be concentrated in sites that are expected to be prone to attacks by criminals and fixed.


References


Christian Czosseck, " Kenneth Geers (Eds.). (2009). The Virtual Battlefield: Perspectives on Cyber Warfare (Vol. 3). Ios Press.


Levesque, R., Walsh, D. A., " Whyte, D. (2015). Securing Cyberspace: Towards an Agenda for Research and Practice. Technology Innovation Management Review, 5(11).


Li, G., Niu, W., Guo, L., Batten, L., Liu, Y., " Cai, G. (2015). Securing Cyberspace. Concurrency and Computation: Practice and Experience, 28(6), 1870-1871. doi:10.1002/cpe.3753


Kremer, J. F., " Müller, B. (Eds.). (2013). Cyberspace and International Relations: Theory, Prospects And Challenges. Springer Science " Business Media.


Murphy, T. (2010). Security Challenges in the 21st Century Global Commons. Yale J. Int'l Aff., 5, 28.


McGuire, M., " Dowling, S. (2013). Cyber crime: A Review of the Evidence. Summary of key Findings and Implications. Home Office Research report, 75.


Shamsi, J. A., Zeadally, S., " Nasir, Z. (2016). Interventions in Cyberspace: Status and Trends. IT Professional, 18(1), 18-25. doi:10.1109/mitp.2016.19

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price