Global Security in Cybersecurity

Technological advancement has emerged as an indispensable driver of efficiency and financial success for businesses and government corporations worldwide. However, the desire for more significant I.T. investments has also given rise to cybersecurity Vulnerabilities. Several corporations are rapidly trying to upgrade their systems and network systems, insulate their crucial properties, and prevent significant data leaks due to the increasing prevalence and advanced threats. This paper explores the cybersecurity scenario and offers solutions that could be useful in avoiding major cybercrimes and espionage.

The Russian government has long conducted a series of cyber-attacks targeted at the U.S. digital infrastructure, aiming to steal classified information or even sabotage operations. In 2017, the Russian intelligence operatives infiltrated Ukrainian network infrastructure with the virus identified as NotPetya. A tiny U.S. (Blank,2017). medical center lost access to all Windows systems in the collection as the virus spread, and many other hospitals depending on the system were left with operational difficulties. These attacks have escalated with the Russian invasion of Ukraine, hence a need for a strategic end-state for the scenario, which is currently a threat to U.S. national security.

From the scenario analysis, the Russian Espionage agents are targeting major American industries. The strategic production, identification, and assessment of natural resources like energy materials have been targeted in the past to steal information that could help Russia determine the U.S. economic strengths and vulnerabilities. The intelligence spies have also targeted the military capability and counterintelligence departments. Russian military intelligence agents have been known to conduct cyber espionage mainly. This espionage is undertaken through various techniques such as social engineering, malware distribution, and the APT, among other ways. Historical cyber espionage, referred to as the GhostNet, was conducted at the University of Toronto, which compromised sensitive information linked to the government(Broadhurst et al.,.2013). The malicious made the information easy to access and monitor.

Implementation of mandatory BringYourOwn Device (BYOD) policy in Government affiliated institutions

Implement a law that directs employees within a potential target institution to bring their own devices to the workplace. Although the policy may seem inexpensive and straightforward to execute, it will be the most effective way of reducing intentional or unintentional data leakage risks. It shall give protocols on the software installation and maintainance, as well as a system that shall control the Universal Serial Bus devices(SCHMIDLE jr et,.2017). The FBI and other security agencies tasked with fighting cybersecurity and espionage threats have always focused on tracking down the illegal Russian agents assigned espionage and disrupting their actions before sending the information. Although the strategy has been successful in frustrating the efforts of these agents, the method is not very effective since most of these illegals may still be operating in the country and may have access to influential organizations. Several Russian spies used falsified credentials to imitate the identities of legitimate citizens who had been enrolled in government professions and enlisted in the U.S. institutions of higher learning universities even further to infiltrate government institutions. During the 1990s, two of the individuals lived in New Jersey until they purchased a house near Montclair, according to FBI data(Riehle,2021). They were identified as Richard and Cynthia Murphy. Journalists Vicky Peláez and Mikhail Vasenkov, who lived in New York, and went by the nickname Juan Lazaro, are another pair mentioned in the records(Riehle,2021). According to court documents, spouses were established in Russia to cohabitate inside the nation where they would work. Whenever foreign adversaries penetrate the network, they prioritize accessing critical databases by securing higher privileges. Such access rights are primarily derived by using fake identities or taking advantage of network administration procedures’ weaknesses. Strong cybersecurity management is crucial for corporations since they run the most significant risk of peripheral manipulation when giving workers unrestricted access to essential information and records. Adopting the principle of low privilege essentially restricts individuals’ access privileges to a minimum level, hence an effective measure to counter-espionage from agents that are unnoticed by the government agents. By requiring users to modify ther login credentials frequently, utilize authentication factors, and document any questionable behavior, I.T. managers can take a systematic method of credential administration.

Investment in the Vulnerability Assessment of Key corporations’Network

The United States Government should invest in security measures that involve vulnerability assessment of networks to reduce the vulnerability of the sensor networks. For several years, United States security experts have focused on the outdated response-driven approaches that alwasy emphasized the detection of an attack and recovery of data. Surveying the contemporary cyber attack landscape is essential because the tactics used by the Russian infiltrators keep evolving rapidly(SCHMIDLE jr et al.,.2017). Before implementing new security measures, there should be a clear understanding of the company’s attack landscape. All IoT indicators, workstations, and any gadget connected to the internet within the production line equipment must all be quantified as part of this initiative. As unencrypted devices are quick targets for these hackers, the next phase after mapping out the infrastructure is to ensure that the devices are operating on the most recent firmware and safety upgrades.


Developing mandatory policies to guide the handling of data is essential in preventing the cyber attack on digital infrastructure, especially in the U.S. And considering additional data breaches are constantly emerging, such companies must frequently evaluate risk. The united state’s manufacturers should be given a legal mandate to create an information base for all of the devices that can be connected to the internet and develop a program of firewall status and antivirus protocol checkups. The assessment would be essential in identifying potential threats and categorizing each hazard based on its threat to national security.


Blank, S. (2017). Cyberwar and information war a la Russe. Understanding cyber conflict: Fourteen analogies, 1-18.

Broadhurst, R., Grabosky, P., Alazab, M., & Bouhours, B. (2013). Organizations and cybercrime. Available at SSRN 2345525.

Riehle, K. P. (2021). The ghosts of Russian intelligence: the challenges and evolution of Russia’s illegals program. Intelligence and National Security36(6), 918-924.

SCHMIDLE Jr, R. E., Sulmeyer, M., & Buchanan, B. (2017). Nonlethal weapons and cyber capabilities. Understanding Cyber Conflict: 14 Analogies, 31-44.

Author: Jeff Klein
Find the Writer that Best Suits Your Objectives!