Sie sind auf Seite 1von 7

Running head: THE FUTURE OF CYBERSECURITY 1

The Future of Cybersecurity

Magda Rojas

University of North Texas


THE FUTURE OF CYBERSECURITY 2

The use of technology has evolved over the last decade and has branched into more areas

than the more well-known gaming and entertainment industries that it is usually associated with.

The integration of technology in the corporate, education, medical, and sporting realms as well

has created a greater necessity for a secure and safe transportation of information (Dietrich,

2017). The continued invention and use of technology devices creates a greater need for

cybersecurity. This may seem like a task that is automatic with the rapid acceleration that

technology currently and will continue to have in the future, but there are methods and

preventative systems that are being created now so that users in the future are well-equipped and

safe while moving data from one network to another. The future of cybersecurity is a result of

the need to protect and change the manner in which data is transmitted from one point to another.

The role that the user as well as education should be considered in addition to the technology that

is being created for security purposes.

Risk factors such as the transfer of more data, connections, movement and flow, and

opportunities for malicious software are mentioned as challenges to cybersecurity in the future

(Dupont, 2013). An increase in the amount of data that is being stored or transferred from one

point to another increases the risk of it being invaded by an external source. With a greater

dependency on the internet and the use of online technology, more data is going to be found

online and will require the appropriate security software for the size of the data. Similarly, more

connections to the internet will also be more common in the future and as a result require more

security. More connections can be looked at in the perspective of the number of devices that are

connected and have access to a network. The number of devices and users that have access to a

network puts information that may be sensitive at risk. Security should adapt and be
THE FUTURE OF CYBERSECURITY 3

implemented so that data can only be accessed by privileged users as seen fit. Administrative

personnel must be aware of the risk that is taken when employees leave or move positions that

changes their access to a company’s information.

More connections in the sense of an internet-connected device connecting to many

networks can also pose many risks for the user’s data. As time passes and users continue to move

towards a fully internet connected way of life, the security that is required to provide a secure

transfer of data is going to be significantly more than it is today. The availability of wire-less

internet is adapting as society becomes more technology attached. Users are now needing to be

cautious of the servers that they connect to and the information that they provide when using a

public internet connection. According to Dupont (2013), users are more vulnerable when

connecting to the Internet since public networks can be easily accessed by outside sources that

may be harmful. Although a solution for this is not something that is predicted to be found in the

future, as a user it is important to consider the risks and the rewards that come with using a

public network (Dupont, 2013). Public internet connections are often seen as a convenience, it

can also bring negative consequences if private information is shared through the network. The

users as well as the network providers have a responsibility in order for cybersecurity to be

possible and to keep confidential information safe and protected. There is also a greater amount

of data that is expected to be transmitted in the future creating a greater amount of protection

than is needed today. An overall greater user of technology is expected in the future and will

naturally lead to a greater and growing need for a secure network.

The evolution of technology, especially the internet, up to this point has created solutions

and problems that directly impact the society that we live in today. The Internet and the sharing

of information has created a cyberworld, that requires the similar management and regulation
THE FUTURE OF CYBERSECURITY 4

that the real-world does. The need for regulations led to the creation of programs such as the

National Initiative for Cybersecurity Education (NICE) and Scholarships for Service (SFS) to

provide education on the proper application of various categories in the cybersecurity field

(McDuffie & Piotrowski, 2014). According to McDuffie & Piotrowski (2014), an expansion in

the jobs that are going to be created will occur due to the demand of security that will be needed

in the future. Although it is in a digital setting, security is needed just as much as it is needed in

the real world. The National Security Agency (NSA) and the Department of Homeland Security

already have programs available at one of their designated Centers of Academic Excellence in

Information Assurance Education (CAE/IAE) (McDuffie & Piotrowski, 2014). Providing

education and creating the programs that will teach learner’s how to prevent and intervene in a

malicious situation now will have positive consequences on the future outcome and evolution of

the cyberspace. Availability of the proper education that formally explains and outlines the skills

necessary to deal with cybersecurity now will equip learners to problem-solve through issues that

may occur in the future.

According to McDuffie & Piotrowski (2014), there has been effort made to create a

curriculum for a cybersecurity degree in a formal higher-education setting. There are currently

programs that provide learners with knowledge about cybersecurity, however, there are many

unknown elements that compose the internet that make the challenge of providing a secure

network greater. The internet infrastructure, overall form of the internet, and that of the

malicious software and interference creates a difficult task of organizing and designing a well-

constructed cybersecurity curriculum. The unpredictability of the issues that will occur in the

future as well as the form that the internet will take creates a layer of complexity in deciding

what skills and tools are priority for the learner to be knowledgeable of and understand. The
THE FUTURE OF CYBERSECURITY 5

future of cyberspace security may seem fascinating and promising. It is important to consider the

implications that the advancing technology can have on the user and the user’s content. The

future of technology directly impacts the future of cyber security. The risk that is taken can be

matched with preventative actions that must be taken as the rate that the integration of the

internet in our lives continues to grow.

While technology and the security that it is paired with advances, it is important to take

into consideration that malicious software is also being created to be more invasive (McDuffie &

Piotrowski, 2014). The advancing of technologies, both malicious and not, emphasizes the

importance of exploring and understanding the avenues that the Internet can take in the future.

The education of cyberspace and the significance impact that creating a safe online environment

has on the user is also beginning to reach those that will be most affected by the future of the

internet. Students in grades K-12 are already becoming knowledgeable of the importance of

cybersecurity and the role that they play in being safe users. The trending Science Technology

Engineering and Mathematics (STEM) schools are contributing to piquing and engaging young

learners into the cyber security career through the disciplines previously mentioned. The

appropriate introduction of the information to learners at younger levels will contribute to the

workforce that will be a necessity in the future as technology seeps into unprecedented aspects of

our lives.

According to Dietrich (2017), there is a human need for privacy and is even included in

the Universal Declaration of Human Rights. The need for privacy continues to apply in the

online and cyber world. It is important to note that there is a significant amount of responsibility

on the user to create a safe and secure cyberworld. Taking precautionary actions, gaining and

staying informed of the current cybersecurity strategies that are available are part of that role
THE FUTURE OF CYBERSECURITY 6

(McDuffie & Piotrowski, 2014). There are programs are created by government agencies that are

made to educate and create a workforce that will effectively protect the future cyberworld as well

as other methods to be cautious when using a public network. The methods of transmitting data

may change and take a form that was not predicted and as a result the need for a greater amount

of investment through education and time now will directly impact the effectiveness that the

security will have in the future. There is much that has been understood about the Internet and

networks, but there is still much to learn and explore as it applied to our needs in a safe and

secure manner. The internet was made to enhance and create an efficient way to accomplish

tasks and access information, and can only be used in this way when used in an appropriate and

secure fashion. The resources and information are available and require the willingness and the

desire of society to make the contribution that is needed now to develop effective cybersecurity

in the future.
THE FUTURE OF CYBERSECURITY 7

References

Dietrich, S. (2017). Cybersecurity and the future

Dupont, B. (2013). Cybersecurity futures: How can we regulate emergent risks? Technology

Innovation Management Review, 3(7), 6-11. 10.22215/timreview/700

McDuffie, E. L., & Piotrowski, V. P. (2014). The future of cybersecurity

education. Computer, 47(8), 67-69. 10.1109/MC.2014.224 Retrieved

from https://ieeexplore.ieee.org/document/6879748

Das könnte Ihnen auch gefallen