Emerging Cybersecurity Technologies and Policies within National Security Defense
By: John Haley
Table of Contents
2. Cybersecurity Technology
3. Features of New Technology
4. Role of Federal Government in Development
5. Federal Government: Positive or Negative?
1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu 2. Greenberg, A. (2013). President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy. Forbes.Com, 32. 3. Hoover, J. N. (2011, November 7). DARPA boosts cybersecurity research spending 50%. Information Week. Retrieved from "http://www.informationweek.com/news/government/security/231902495" 4. Kramer, F., Star, S., & Wentz, L. (2009). Cyberpower and national security. Potomac Books,Inc 5. Nye, J. (2008, December 10). Cyber insecurity. Retrieved from: "http://www.project-syndicate.org/commentary/nye65/English" 6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086- 7. Chan, E., Chaugule, A., Larson, K. and Campbell, R. (2010). Performing Live Forensics on Insider Attacks. CAE Workshop. Illinois University 8. Rogers, E. M., Carayannis, E. G., Kurihara, K., & Allbritton, M. M. (1998). Cooperative Research and Development Agreements (CRADAs) as technology transfer mechanisms. R&D Management, 28(2), 79 9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm
In order to protect our national infrastructure and the vital private information of our citizens from hackers, enemy nation-states, and terrorists we must be proactive in the development of new technologies and the policies that guide them. The more time and money spent on proactive research and development in relation to security issues facing this nation, the less time and money will be required to repair a major failure or compromise within the federal government or private sector. Following the attacks on September 11th, President George W. Bush’s administration initiated the Comprehensive National Cybersecurity Initiative (CNCI) in order to address the concerns of national security and the threats to cybersecurity (UMUC, 2012). Following the Bush administration, the Obama administration continued this push for a more efficient cybersecurity strategy. President Barack Obama issued an executive order for cybersecurity intelligence in his 2013 State of the Union Address. In this executive order President Obama outlined the new policies aimed at battling cyber espionage attacks on American enterprises and federal government agencies, as well as, strengthening the defenses for American critical infrastructure. (Greenburg, 2013) The evolution of technology has enabled hackers today to not only settle for stealing identities and hacking personal bank accounts, but now there is a risk to our national power grid, financial institutions including the stock market, and our vital air traffic control systems. President Obama made it clear that hardening our defenses against these types of attacks is of great priority. The executive order set into motion a policy that will essentially enable much more efficient information sharing between federal agencies and major US private corporations that may be targeted. This is extremely important because most of our national power grid suppliers are privately owned.
This paper will further analyze the cybersecurity technologies of today as well as the technologies coming down...
Please join StudyMode to read the full document