Journal Entry #4

Cybersecurity is such a complex subject. To make a strong and efficient cybersecurity infrastructure, many factors must be accounted for. The best plans for securing cyber assets are plans that place the safety of clients and employee personnel at the forefront of the proposal. Next would be the company’s data, and lastly would be the equipment that transmits the data from one station to another. Some of those factors that impact the effectiveness of a plan are the environment, employee staffing and training, company protocol, technology policy, and more. What is key, is that from locale to locale and company to company, these factors vary by very large degrees. In various regions of the United States, the same environmental factors and regulations that are present do not exist in others. Along the east coast, factors such as hurricanes and potential floods in places like Louisiana and Florida are prevalent threats, that do not exist in places such as Arizona or Oklahoma that experience extreme heat and drought.  Environmental factors are generally simple to consider when constructing a plan for cybersecurity, but one of the more intricate factors that must be sorted through is the question of technology policy and company protocol as it varies between countries. Fortunately, comparatively speaking, the United States have a rather lenient set of standards when it comes to internet usage hygiene and general cyber ethics. On the contrary, China has a very strict policy when it comes to the usage of the internet which implies that their cybersecurity policies are much greater. Making a comparison between the cyber risk that pose a to the U.S. and China, there are many more that China would take offense to. If a Chinese citizen posts something to a social media platform that does not appeal to the government, that citizen is liable to be executed. If an American citizen leaks sensitive information to a foreign entity, that citizen is liable to be imprisoned for life. Although the two actions are nothing alike, from the degree of punishment that the “perpetrators” will experience they are equivalent. This is the difference between the cybersecurity risks that exist between the U.S. and another country.

Leave a Reply

Your email address will not be published. Required fields are marked *