Access Millions of academic & study documents

Contrast Between The Enisa And Commonwealth Approaches To Developing National Cybersecurity Strategies

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/10
Running head: APPROACHES TO CYBERSECURITYSTRATEGIES 1
Contrast between the ENISA and Commonwealth Approaches to Developing National
Cybersecurity Strategies
Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/10
APPROACHES TO CYBERSECURITYSTRATEGIES 2
Introduction
The human life today has taken an approach different from that of the former generation.
The differentiating factor between the current and the past generation is technological
advancement. Today, unlike several centuries ago, the functioning of the society, businesses, and
the government is primarily depended on the efficiency of technological infrastructure. Three
factors determine the efficiency of this technological infrastructure in today's world. The three
include the availability of the information flowing through the infrastructure, its integrity, and
confidentiality. The increased dependence on information technology and technological
infrastructure implies that any form of activity that jeopardizes the above factor can results to
immeasurable loses. For this reason, there is a need for a national cybersecurity strategy to
ensure the safety and security of the cyberspace. The reason why cybersecurity has become an
issue of national interest and importance is that it enhances the informational infrastructure and
services.
The purpose of the paper thus is to compare the compare European network, and
information security agency (ENISA) and the Commonwealth Telecommunications Organization
(CTO) approaches to the cybersecurity. The paper will explore the differences and similarities
between the principles and guidelines held by each organization in order to determine the best
approach for developing a national cybersecurity strategy. It is essential that every country has
its own national cybersecurity strategy. The endowment of information technology infrastructure
varies across countries. The dependence of the information technology infrastructure also varies
across countries. Developed countries are highly endowed in terms of information technology
infrastructure as compared to both developing and underdeveloped countries. The implication of
this is that developed nations have a high dependence on such technologies than developing and

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/10

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 10 pages?
Access Now
Unformatted Attachment Preview
Running head: APPROACHES TO CYBERSECURITYSTRATEGIES Contrast between the ENISA and Commonwealth Approaches to Developing National Cybersecurity Strategies Name Institutional Affiliation 1 APPROACHES TO CYBERSECURITYSTRATEGIES 2 Introduction The human life today has taken an approach different from that of the former generation. The differentiating factor between the current and the past generation is technological advancement. Today, unlike several centuries ago, the functioning of the society, businesses, and the government is primarily depended on the efficiency of technological infrastructure. Three factors determine the efficiency of this technological infrastructure in today's world. The three include the availability of the information flowing through the infrastructure, its integrity, and confidentiality. The increased dependence on information technology and technological infrastructure implies that any form of activity that jeopardizes the above factor can results to immeasurable loses. For this reason, there is a need for a national cybersecurity strategy to ensure the safety and security of the cyberspace. The reason why cybersecurity has become an issue of national interest and importance is that it enhances the informational infrastructure and services. The purpose of the paper thus is to compare the compare European network, and information security agency (ENISA) and the Commonwealth Telecommunications Organization (CTO) approaches to the cybersecurity. T ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4