Part 1
Recommendation for emergency management related cyber security issues
As per the discussion that has been done in the relative paper, it has been noticed that according to the Section 214 act of the E-Government of 2002, it must be ensured that Information Technology must be used extensively to enhance the crisis preparedness of any organization (Haddow, Bullock & Coppola, 2017). This should prepare any organization to be responsive to the consequence management in case of any emergency cyber security issues are noticed. Emergency management planning bridges the networks in the form of per capita also in political organization in a community that has the ability to provide an environment in the organization in which the collaboration is most likely to occur in formally making the collaboration transferred into the emergency management planning easily (White, 2016). The recommendations in which emergency management can be established in the organization can be discussed further below:
Justification for the recommendations
Any company would feel to survive if there is no strategy applied for emergency management. Emergency management makes a company impermeable to disastrous situations that may arise out of the blue. In this part it will be justified about the recommendations for emergency management in an organization as made above (Kapucu & Hu, 2016). First and foremost the primary use of Information Technology as an influence to enhance the disaster management or any other emergency situation forms the basis of having an emergency management security system in any organization. Since most of the threats and vulnerabilities that come into an organization arise due to the cyber world it is absolutely necessary to implement it management system to tackle the vulnerabilities arriving from the cyber world.
In another recommendation it is required that short term opportunities are used to enable the IT (Motapon, Dessaint & Al-Haddad, 2014). This is because the short term opportunities would make the IT system more restraint in front of the attacks that a company faces from the cyber world.
However for this it is required that proper arrangement is done in terms of all the matters that has been decided to make the organization be absolutely permeable in case of any emergency attacks arrive from the cyber world.
Also implementing IT in a system of business process in an organization needs to implement fuel tools required for the proper permeability of the organization (Senthilkumar, Ponmagal & Sujatha, 2016). The stakeholders should be informed properly about them and also about the investments that R&D team faces. If the stakeholders are not made understand the system can fall apart.
These tools and products required for implementing it for the emergency Management related cyber security issues should be assessed well to check their work daily due to their implementation and what effect it has on the organization.
In addition, it is needed that the adoption of IT in the business process very recently for improving the acquisition the employees in the organization should be thoroughly trained to handle the system well (Waugh, 2015). Since the emergency management system works to Shield the organization mishandling them may lead to the exactly opposite requirement it serves.
Part 2
What needs to be done and how do we get people to do it?
The primary need of any organization to implement the cyber systems to protect the entire organization from any kind of further cyber threats is the understanding of the fact that the organizations needs a cyber security system. The understanding of the fact that the need of security from cyber threats is a must in these contemporary times is somewhat necessary, as it has been noticed that many organizations have perished for being vulnerable to these threats.
First and foremost, an organization and the people related to it needs to understand the fact that the threats in the cyber world have the ability to rob the company out of its most valuable assets and hence make them completely understand the defense mechanisms of it (Min et al., 2015). The National government fails to acknowledge the uncertainties that have the potential to strike at the foundations of the traditional system of a state where it is the most uncertain. The administration has the requirements that would reorganize the traditional architecture with respect to the cyber threats and their nature that has been required to challenge the up-and-coming intimidation from the cyber domain. A government cannot be dependent on any company; instead a company depends on the government. However, when a company starts depending on the government, the company’s data and valuable information also begins to depend on the government (Hogan & Newton, 2015). The need for cyber security model in every organization should be induced within not only the organization but the government that handles it. It is to be specified that people should be made aware of the entire cyber security plan and what it does to an organization and the government that handles it by training module and repeated foreshadowing on the matter are providing examples of the previous cyber security attacks that has resulted in disruption in a government and the subsequent organization (Awan et al., 2017).It can further be reinstated that an organization and an entire nation should be made aware of the cyber security attacks and its results to ensure a proper permeability of the entire government handling the organization and the entire country from the alleged cyber security attacks.
Will a traditional regulatory model work in this space?
In the previous times the regulatory model that were used to make an organization be in permeable to attacks would not work further in case of cyber security attacks for the issue in the following case study. This is because an organization nowadays implements various advanced technical needs in order to thrive in the business world that has been changing ever since its inception and has adopted the new technological advancements in the course (Lundberg et al., 2018). This means that the business world now runs entirely or more specifically on the digital world. Therefore it becomes mobile vulnerable to cyber security threats and much more open to the malicious attack cause that have been in an organization or the entire country that governs it. Also according to the case study it has been found that there are places where an organization seems to decide for a government (Carr, 2016). This is a much greater issue because ideally a government should handle the matters of an organization and not the other way around. This is because if a company starts deciding for government this would mean that the intricate data of the government would be considered in the organization. Acquiring such a huge data and protecting it from the cyber security threats is not something that the regulatory model of the traditional Security System would work adequately on.
Does a newer model to address uniquely 21st century issues need to be developed?
From the above case study it can be noticed that Larry Clinton has described the government and industry partnership with reference to a relationship between parent and child. The only difference between this is child generally becomes reliant on the parents beat financially physically or emotionally. However in case of the relationship between an industry and the government it has been seen that in the latest circumstances in the United States the government is becoming reliant on the child because of the cyber security threats and other cyber security systems (Radvanovsky & Brodsky, 2016).
In the old times business was dependent entirely on its physicality. That is the service the provided or the appearance they shared had a physical existence. For example if a Logistics Company delivered products to the customers it would be seen that the customer has approached the logistics organization to deliver them with the consignment of handling their products to a specified destination. Nowadays the intermediate person having a physical existence is diminished and eradicated from the business system because of the implementation of the online systems (Min et al., 2015). With the advancement of Technology in the 21st century it has been noticed that all business organizations have taken up or adapted to the advanced technology to benefit their business. Therefore all the threats that the business can face comes from the cyber world and does not have a physical existence. Therefore to treat the latest cyber security attacks it is needed that a new model be implemented to uniquely address these issues.
Whom should the government regulate?
The failing of an organization means the slow disintegration of the government itself. Nowadays it can always be seen that the faulty security systems in the organization against cyber security attacks has led to many issues regarding data security in the organization which is affected the government is well. This is resulted into the lack of proper implementation of cyber security best practices and relatively simple fixes like software updates and security patches (Choejey et al., 2015). The organizations have filled to attain this and this is created for the problems because the industry and organizations have actually known to be for bigger stronger and more resourceful than the government. Therefore a government should regulate the organizations to have a proper and feasible updated cyber security system to save the organization from further cyber security threats and attacks and ensure that the company is permeable to for the attacks in future.
Conclusion:
In conclusion it can be stated from the above case study it can be noticed that Larry Clinton has described the government and industry partnership with reference to a relationship between parent and child. The only difference between this is child generally becomes reliant on the parents beat financially physically or emotionally. However in case of the relationship between an industry and the government it has been seen that in the latest circumstances in the United States the government is becoming reliant on the child because of the cyber security threats and other cyber security systems. As per the case study report suggest it can be seen that the threats that business organizations face nowadays are all based on the cyber security attacks. With the advancement of Technology in the 21st century it has been noticed that all business organizations have taken up or adapted to the advanced technology to benefit their business. Therefore all the threats that the business can face come from the cyber world and do not have a physical existence. Therefore to treat the latest cyber security attacks it is needed that a new model be implemented to uniquely address these issues. The government should also regulate this system that every governmental or private organization should implement tools and systems to become permeable to the online threats.
Reference:
Awan, J. H., Memon, S., Khan, R. A., Noonari, A. Q., Hussain, Z., & Usman, M. (2017). Security strategies to overcome cyber measures, factors and barriers. Eng. Sci. Technol. Int. Res. J, 1(1), 51-58.
Carr, M. (2016). Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), 43-62.
Choejey, P., Fung, C. C., Wong, K. W., Murray, D., &Xie, H. (2015, November). Cybersecurity practices for E-Government: An assessment in Bhutan. In The 10th International Conference on e-Business, Bangkok, Thailand.
Haddow, G., Bullock, J., & Coppola, D. P. (2017). Introduction to emergency management. Butterworth-Heinemann.
Hogan, M., & Newton, E. (2015). Report on Strategic US Government Engagement in International Standardization to Achieve US Objectives for Cybersecurity.
Kapucu, N., & Hu, Q. (2016). Understanding multiplexity of collaborative emergency management networks. The American Review of Public Administration, 46(4), 399-417.
Lundberg, O., Yngwe, M. Å., Stjärne, M. K., Elstad, J. I., Ferrarini, T., Kangas, O., …&Fritzell, J. (2018). The role of welfare state principles and generosity in social policy programmes for public health: an international comparative study. The Lancet, 372(9650), 1633-1640.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cyber security strategy. International Journal of Security and Its Applications, 9(2), 13-20.
Motapon, S. N., Dessaint, L. A., & Al-Haddad, K. (2014). A comparative study of energy management schemes for a fuel-cell hybrid emergency power system of more-electric aircraft. IEEE transactions on industrial electronics, 61(3), 1320-1334.
Radvanovsky, R., & Brodsky, J. (Eds.). (2016). Handbook of SCADA/control systems security. CRC Press.
Senthilkumar, R., Ponmagal, R. S., & Sujatha, K. (2016). Efficient Health Care Monitoring and Emergency Management System using IoT. International Journal of Control Theory and Applications, 9(4), 137-145.
Waugh, W. L. (2015). Living with Hazards, Dealing with Disasters: An Introduction to Emergency Management: An Introduction to Emergency Management. Routledge.
White, C. M. (2016). Social media, crisis communication, and emergency management: Leveraging Web 2.0 technologies. CRC press.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download