Solved by a verified expert :Running Head: Are You Protected Online?Are You Protected Online?Jared GoodyENG122: English Composition II (PTF1616A)Instructor: Erin ReaumeMay 5th, 20161 Are You Protected Online?2Are You Protected Online?Every day more and more people fall victim to a threat encountered while online. Millions ofAmericans have their identity stolen from them each year, and this number only continues togrow. These threats are real, and there are ways people can protect themselves. The Departmentof Homeland security needs to do more to protect citizens from cyber threats, because thesethreats can be detrimental and most people are not aware of the extent of these threats.Cyberattacks happen every day in our growing and changing world. The general public has aright to adequate defense against these threats. The task force assigned to this issue isnonexistent. The clarity for need of an organized, structured, professional defense systembecomes more significant every day. According to Burley, Eisenberg & Goodman (2014), Theneed for a cybersecurity workforce is shown in the thousands of cyberattacks that happen daily.The development of cybersecurity workforces across the globe shows that the US lacks supply ofwell-trained personnel. Burley, Eisenberg & Goodman (2014) also states, “Professionalization—activities such as certification, licensure, and skill-based competency exams—has been advancedas a strategy for creating a workforce capable of addressing the growing cybersecurity threat.”We are in dire need of professionalization of this workforce. These are issues that need to beaddressed before they get out of hand.In 2014, an astounding 17.6 million Americans were victims of identity theft. (BJS, 2014)The technology used changes daily, and these threats continue to become more advanced everyday. Citizens need to be made aware of these threats, and what needs to be done to ensure oursafety. “Today, almost unlimited access by a large, knowledgeable community of end users Are You Protected Online?3from desktop, dial-in, and network facilities creates a new and extremely vulnerableenvironment. The threats to data and system security include natural and man-made disasters,errors by loyal employees, and the overt acts of competitors, hackers, and creators of computerviruses.” (Loch, Carr, Warkentin, 2015) Computer technology has changed drastically in yearsof late. Along with the advancement in technology, has come the advancement of the relatedthreats. Some of these issues are related to the user, and can be prevented. Further educating theusers can be an effective cybersecurity measure.Efforts have been made towards furthering the online protection of citizens, and these effortshave run in to opposition. A proposed standard of global security and ethics would have benefitsfor internet users. The US government has made efforts to enhance its cybersecurity. Many ofthese efforts have also failed for various different reasons, mainly lack of personnel. Movementshave been made towards a globalized cybersecurity, and these movements have also failed. “TheCybersecurity Act of 2012 would have tasked a new National Cybersecurity Counsel to workwith private sector critical infrastructure owners and operators to identify critical cyberinfrastructure, conduct sector-by-sector cyber risk assessments, and establish a voluntary,outcome-based cybersecurity program for critical infrastructure. However, the bill facedopposition from the private sector and failed to pass the Senate.” (Shackelford, Proia, Martell,Craig, 2015, p.333-334)Alternatively, the US government actively defends itself against thousands of online securitythreats each day. Some of these efforts should be directed towards the citizens, to help ensuretheir safety as well. “Today the military can detect and remedy intrusions within hours, if notminutes. From September 2014 to June 2015 alone, it repelled more than 30 million known Are You Protected Online?4malicious attacks at the boundaries of its networks. Of the small number that did get through,fewer than 0.1% compromised systems in any way. Given the sophistication of the military’scyberadversaries, that record is a significant feat.”(Winnefield, Kirchhoff, Upton, 2015) Givenhow effectively the US government protects itself against online security threats, it would be safeto assume the US citizen’s security is not of the government’s concern. The most effective wayto ensure online security, is for internet users to educate themselves.In conclusion, the US government should do more to protect citizens from cyber threats.These threats can be detrimental, and many people do not know they exist. The US governmentneeds to develop a professionalized, structured work force dedicated to cyber protection. Manyof the efforts towards advancement of cybersecurity have faced heavy opposition from privatesectors. While it seems citizens should rely on their government, it has proven more effective toseek education on the matter individually. If users are at least made aware of the threats posed tothem, they have the option of seeking out their own protection. How far will cybersecurity bebreached until a proper form of security is put in place?Are You Protected Online?5 ResourcesBurley, D., Eisenberg, J., Goodman, S. (2014) Would Cybersecurity Professionalism HelpAddress the Cybersecurity Crisis? Viewpoints, 57(2), 24-27, DOI:10.1145/2556936Retrieved from: http://eds.b.ebscohost.com.proxylibrary.ashford.edu/eds/pdfviewer/pdfviewer?sid=b389dfe1-be03-4ba5-b9bb61882361ee05%40sessionmgr105&vid=4&hid=111Loch, K., Carr, H., Warkentin, M. () Threats to Information Systems: Today’s Reality,Yesterday’s Understanding. MIS Quarterly, 16(2), 173-186Retrieved from: http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=16&sid=b389dfe1-be03-4ba5-b9bb61882361ee05%40sessionmgr105&hid=111&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=9604010630&db=crhShackelford, S., Proia, A., Martell, B., Craig, A. (2015) Toward aGlobal Cybersecurity Standard of Care?: Exploring the Implications of the 2014NIST Cybersecurity Framework on Shaping Reasonable National andInternational Cybersecurity Practices. Texas International Law Journal, 50(2), 303-353Retrieved from: http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=8&sid=b389dfe1-be03-4ba5-b9bb61882361ee05%40sessionmgr105&hid=111&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=108372861&db=aphAre You Protected Online?6 ResourcesWinnefield Jr., J., Kirchhoff, C., Upton, D. (2015) Cybersecurity’s Human Factor: Lessons Fromthe Pentagon. Harvard Business Review, 93(9), 86-95,Retrieved from: http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=6&sid=b389dfe1-be03-4ba5-b9bb61882361ee05%40sessionmgr105&hid=111&bdata=JnNpdGU9ZWRzLWxpdmU%3d#AN=108820482&db=bsh