Cyber Security In Canada Essay

Improved Essays
The Internet is growing rapidly, and interconnectivity is increasing. The number of Internet users should top 3 billion in 2015, and by 2018 will be in use by more than ½ of the world’s population [1]. In addition to allowing the world to communicate, the Internet drives economic growth: through e-commerce, about $8 trillion dollars change hands yearly, and the Net contributes significantly to global growth, surpassing the value of some traditional industries such as agriculture, mining and utilities [2]. In Canada, over 92% of the population uses the Internet [1], and the total value of e-commerce is over $136 billion [3].
At personal and corporate levels, we are also developing an “Internet of Things”, a network of devices that perform a variety of daily functions, as well as have the ability to inter-communicate. In 2008 the number of devices connected to the Internet exceeded the number of people on earth, and by 2020 the Internet is expected to consist of 50 billion “things” [4]. This relentless development includes communications with the Internet-exposed portion of our CI, and is called the “Smart Grid” [5]. The pervasive and evolving use of the Internet are not only putting new capabilities into the hands of business and society, but also providing hackers, terrorists and criminals with a vast new landscape to exploit and potentially damage our CI. The frequency of cyber security incidents is rising. According to a 2015 Price Waterhouse Cooper (PWC) world-wide survey, the total number of detected security incidents climbed to 42.8 million this year, an increase of 48% from 2013. PWC reports that the number of detected security incidents have increased 66% year over year since 2009, and that the annual costs of investigating and mitigating security incidents has almost doubled over 2013 [6]. No industry escapes cyber attack [7]. Our CI includes all processes, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of Canadians [8], and some measures indicate that CI, especially the energy sector, receives a disproportionate share of attacks [9]. A cyber attack on CI could come from competitors, adversarial states, politically motivated terrorists/hacktivists, or disgruntled insiders. Attacks on CI may use techniques ranging from simple abuse of unprotected systems, to sophisticated exploits such as spear phishing emails (socially engineered tricks to fool users into downloading and or executing malware) as well as unpublished zero-day attacks on vulnerabilities in software [10]. Of particular concern are vulnerabilities in industrial control software (ICS) and supervisory control and data acquisition (SCADA) software, used to control critical equipment at power companies, manufacturing facilities, water treatment plants and
…show more content…
Progress has been made on pillar one of the CCSS but it is clear that progress on cyber security of CI in Canada lags. Although Canada established a Canadian Cyber Incident Response Centre (CCIRC) with Public Safety, the Auditor General (AG) of Canada looked at the issue and reported in fall 2021 that the government has made limited progress in leading and coordinating activities with partners to secure Canada’s CI from cyber threats [17].
The recognition of the increasing cyber threat to CI and the lack of progress on pillar 2 of the CCSS have not gone unnoticed by media, independent policy groups and the general public, who are calling for the government to share expertise and information to assist CI to increase their cyber security [18, 19,

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The appearance of the Internet and fast development of the computer play an important role in changing our world into the era of globalization. Communication of computer network has made humankind having the fastest and cheapest data transfer to all over the world, which is symbolized by the Internet (Batinic, 2013). The Internet is by far the most…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The internet, a global network consisting of interconnect networks represents a connected world where data and information can be discovered and shared without limits. Information and communication technology (ICT’s) acts as a gateway to the internet connecting people globally. The problem is that Information and communication technology, is not evenly distributed around the world and thus there is the issue of the digital divide. The digital divide is the inequality between people with access to these information and communication technology and those do not. On a global scale, the global digital divide covers disparities between the developed countries which have access to this form of technology verses the developing countries which do not have access to this technology depriving them from developing into a developed country.…

    • 1380 Words
    • 6 Pages
    Great Essays
  • Brilliant Essays

    (Stewart, 2015) This effort should focus on key aspects necessary to enable practical mission bridging across the elements of U.S. cyber activities: foundational capabilities and investments such as upgraded infrastructure, increased bandwidth, and integrated operational capabilities; enhanced collaboration, including common technology, tools, and procedures; and enhanced shared situational awareness through shared analytic and collaborative…

    • 1749 Words
    • 7 Pages
    Brilliant Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On September 11, 2001, America suffered its worst terrorist attack in history. On that day four planes were hijacked in mid air. Two planes hit the World Trade Center, one plane hit the U.S Pentagon, and the final plane was suspected to hit the White House, but the passengers took over the plane and crashed on a field in Pennsylvania. George W. Bush was the President of the United States at the time and knew there needed to be a change in security. The Department of Homeland Security was established on November 25, 2002 after George W. Bush signed the Homeland Security Act of 2002 which created a federal department in the U.S that oversees security on the ground and in the air.…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Considering its unprecedented nature, new Internet legislation provides a unique opportunity for Americans to alter the role of all future technology in both the local community and on a national scale. For consumers and…

    • 1342 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays