Beruflich Dokumente
Kultur Dokumente
Magda Rojas
The use of technology has evolved over the last decade and has branched into more areas
than the more well-known gaming and entertainment industries that it is usually associated with.
The integration of technology in the corporate, education, medical, and sporting realms as well
has created a greater necessity for a secure and safe transportation of information (Dietrich,
2017). The continued invention and use of technology devices creates a greater need for
cybersecurity. This may seem like a task that is automatic with the rapid acceleration that
technology currently and will continue to have in the future, but there are methods and
preventative systems that are being created now so that users in the future are well-equipped and
safe while moving data from one network to another. The future of cybersecurity is a result of
the need to protect and change the manner in which data is transmitted from one point to another.
The role that the user as well as education should be considered in addition to the technology that
Risk factors such as the transfer of more data, connections, movement and flow, and
opportunities for malicious software are mentioned as challenges to cybersecurity in the future
(Dupont, 2013). An increase in the amount of data that is being stored or transferred from one
point to another increases the risk of it being invaded by an external source. With a greater
dependency on the internet and the use of online technology, more data is going to be found
online and will require the appropriate security software for the size of the data. Similarly, more
connections to the internet will also be more common in the future and as a result require more
security. More connections can be looked at in the perspective of the number of devices that are
connected and have access to a network. The number of devices and users that have access to a
network puts information that may be sensitive at risk. Security should adapt and be
THE FUTURE OF CYBERSECURITY 3
implemented so that data can only be accessed by privileged users as seen fit. Administrative
personnel must be aware of the risk that is taken when employees leave or move positions that
networks can also pose many risks for the user’s data. As time passes and users continue to move
towards a fully internet connected way of life, the security that is required to provide a secure
transfer of data is going to be significantly more than it is today. The availability of wire-less
internet is adapting as society becomes more technology attached. Users are now needing to be
cautious of the servers that they connect to and the information that they provide when using a
public internet connection. According to Dupont (2013), users are more vulnerable when
connecting to the Internet since public networks can be easily accessed by outside sources that
may be harmful. Although a solution for this is not something that is predicted to be found in the
future, as a user it is important to consider the risks and the rewards that come with using a
public network (Dupont, 2013). Public internet connections are often seen as a convenience, it
can also bring negative consequences if private information is shared through the network. The
users as well as the network providers have a responsibility in order for cybersecurity to be
possible and to keep confidential information safe and protected. There is also a greater amount
of data that is expected to be transmitted in the future creating a greater amount of protection
than is needed today. An overall greater user of technology is expected in the future and will
The evolution of technology, especially the internet, up to this point has created solutions
and problems that directly impact the society that we live in today. The Internet and the sharing
of information has created a cyberworld, that requires the similar management and regulation
THE FUTURE OF CYBERSECURITY 4
that the real-world does. The need for regulations led to the creation of programs such as the
National Initiative for Cybersecurity Education (NICE) and Scholarships for Service (SFS) to
provide education on the proper application of various categories in the cybersecurity field
(McDuffie & Piotrowski, 2014). According to McDuffie & Piotrowski (2014), an expansion in
the jobs that are going to be created will occur due to the demand of security that will be needed
in the future. Although it is in a digital setting, security is needed just as much as it is needed in
the real world. The National Security Agency (NSA) and the Department of Homeland Security
already have programs available at one of their designated Centers of Academic Excellence in
education and creating the programs that will teach learner’s how to prevent and intervene in a
malicious situation now will have positive consequences on the future outcome and evolution of
the cyberspace. Availability of the proper education that formally explains and outlines the skills
necessary to deal with cybersecurity now will equip learners to problem-solve through issues that
According to McDuffie & Piotrowski (2014), there has been effort made to create a
curriculum for a cybersecurity degree in a formal higher-education setting. There are currently
programs that provide learners with knowledge about cybersecurity, however, there are many
unknown elements that compose the internet that make the challenge of providing a secure
network greater. The internet infrastructure, overall form of the internet, and that of the
malicious software and interference creates a difficult task of organizing and designing a well-
constructed cybersecurity curriculum. The unpredictability of the issues that will occur in the
future as well as the form that the internet will take creates a layer of complexity in deciding
what skills and tools are priority for the learner to be knowledgeable of and understand. The
THE FUTURE OF CYBERSECURITY 5
future of cyberspace security may seem fascinating and promising. It is important to consider the
implications that the advancing technology can have on the user and the user’s content. The
future of technology directly impacts the future of cyber security. The risk that is taken can be
matched with preventative actions that must be taken as the rate that the integration of the
While technology and the security that it is paired with advances, it is important to take
into consideration that malicious software is also being created to be more invasive (McDuffie &
Piotrowski, 2014). The advancing of technologies, both malicious and not, emphasizes the
importance of exploring and understanding the avenues that the Internet can take in the future.
The education of cyberspace and the significance impact that creating a safe online environment
has on the user is also beginning to reach those that will be most affected by the future of the
internet. Students in grades K-12 are already becoming knowledgeable of the importance of
cybersecurity and the role that they play in being safe users. The trending Science Technology
Engineering and Mathematics (STEM) schools are contributing to piquing and engaging young
learners into the cyber security career through the disciplines previously mentioned. The
appropriate introduction of the information to learners at younger levels will contribute to the
workforce that will be a necessity in the future as technology seeps into unprecedented aspects of
our lives.
According to Dietrich (2017), there is a human need for privacy and is even included in
the Universal Declaration of Human Rights. The need for privacy continues to apply in the
online and cyber world. It is important to note that there is a significant amount of responsibility
on the user to create a safe and secure cyberworld. Taking precautionary actions, gaining and
staying informed of the current cybersecurity strategies that are available are part of that role
THE FUTURE OF CYBERSECURITY 6
(McDuffie & Piotrowski, 2014). There are programs are created by government agencies that are
made to educate and create a workforce that will effectively protect the future cyberworld as well
as other methods to be cautious when using a public network. The methods of transmitting data
may change and take a form that was not predicted and as a result the need for a greater amount
of investment through education and time now will directly impact the effectiveness that the
security will have in the future. There is much that has been understood about the Internet and
networks, but there is still much to learn and explore as it applied to our needs in a safe and
secure manner. The internet was made to enhance and create an efficient way to accomplish
tasks and access information, and can only be used in this way when used in an appropriate and
secure fashion. The resources and information are available and require the willingness and the
desire of society to make the contribution that is needed now to develop effective cybersecurity
in the future.
THE FUTURE OF CYBERSECURITY 7
References
Dupont, B. (2013). Cybersecurity futures: How can we regulate emergent risks? Technology
from https://ieeexplore.ieee.org/document/6879748