Preview

Government Cybersecurity Regulation

Best Essays
Open Document
Open Document
2575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Government Cybersecurity Regulation
Government Cybersecurity Regulation of the Private Sector
University of Maryland University College

Abstract
Unlike other countries, the line between the public and the private sector in the United States is not finite, and ideally the two should collaborate toward a common goal of increased cyber security to protect national interests. The future of US cyber security legislation is not without obstacles, as private industry resents increased government intervention, and the government assesses the private sector fails to provide the level of security commiserate with the potential damage caused by compromise to national critical infrastructure. Current legislation often focuses on milestones rather than the end-state and offers little in the way of incentives for increased private industry cost and effort to employ better Cybersecurity.

Government Regulation of Private Industry Cybersecurity Standards
Introduction

The line between the public and the private sector is not as finite as it once was. The September 11, 2001 terrorist attacks in New York City and Washington DC solidified the need for emphasis on national security, and globalization has effected the way the government and commerce interact in regulatory, financial and security matters. There are numerous examples of the confluence of government and private industry; defense contractors, financial institutions, and equipment and service providers (arms, computers, internet and telecommunications). None are of greater national security significance than critical infrastructure. United States critical infrastructure is defined as electrical, hydrological, nuclear, and chemical. In the last three years attacks against US infrastructure have increased exponentially, and there have been 82 of attacks on the electrical grid in the last year alone (Goldman, 2013). Private industry resents increased government intervention in the form of regulations, laws and rules, and



References: Broadhurst, R. (2006). Combating the cybercrime threat: Developments in global law enforcement. In H. Bidgoli (Ed.), Handbook of information security (Vol 1). New York, NY: John Wiley & Sons. Etzioni, A. (2011). Private sector neglects cyber security. The National Interest. Retrieved from http://nationalinterest.org/commentary/private-sector-neglects-cyber-security-6196 Finkle, J Finkle, J. (2013). UPDATE 1-Researchers say Stuxnet was deployed against Iran in 2007. Reuters. Retrieved from http://www.reuters.com/article/2013/02/26/cyberwar-stuxnet-idUSL1N0BQ5ZW20130226?type=companyNews Goldman, D Hart, S.W. (2012). The Mcdougal lecture: National strategy, collective security, and the global common. Denver Journal of International Law & Policy, 41(1), 1-6. Johnson, N Morozov, E. (2009). Cyber-scare, the exaggerated fears over digital warfare. The Boston Review. Retrieved from http://www.bostonreview.net/BR34.4/morozov.php Rahn, R Reed, J. (2012). Langevin to reintroduce cybersecurity legislation in 2013. Foreign Policy. Retrieved from http://killerapps.foreignpolicy.com/posts/2012/12/13/langevin_to_reintroduce_cyber_security_legislation_in_2013 Rutherford, E Waleski, B. (2006). The legal implications of information security: Regulatory compliance and liability. In H. Bidgoli (Ed.), Handbook of information security (Vol 1). New York, NY: John Wiley & Sons

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The Federal Information Security Management Act (FISMA) was signed into law as part of the Electronic Government Act of 2002. The objective of the Act is to “protect government information, operations and assets against natural or man-made threats. (Rose, 2013) The Act requires compliance of government agencies that they must meet certain standards to ensure information is secure at all time. It lays out the steps for each agency to follow and the responsible parties for its compliance. There are a number of companies that partner closely with government organizations as work is contracted out for operation and maintenance, infrastructure upgrades, cleaning, etc. . . This Act ensures that the proper process is in place that these internal…

    • 148 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Schmitt, Eric and Thom Shanker. “Counterstrike: The Untold Story of America’s Secret Campaign against al Qaeda.” Times Books, 2011.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    FISMA Analysis Paper

    • 1671 Words
    • 7 Pages

    Foreign as well as domestic cyber threats and attacks on technological networks and systems have led the Government to enact the Federal Information Security Management Act (FISMA), which is a section of the E-Government Act of 2002. FISMA provides the statutory structure required for management, reporting, assessment and compliance. This paper will provide an analysis of FISMA and why compliance under the Act while need, is more taxing and less security.…

    • 1671 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    In further examination of its role in protecting the homeland from this type of attack, US-CERT responded to an ever-increasing barrage of incidents year after year, deploying as they did in response to Stuxnet for a handful of those. US-CERT prioritizes those incidents with the greatest potential for harm and applies its effort there. (Farran, 2012)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Information technology has drastically altered the Homeland Security world in many ways. The largest form of information technology, the internet, has caused the greatest change for Homeland Security Agencies. For many years now the internet has widely been used for terrorist communication, but more concerning now is the internet is being used to generate support and as a recruiting tool for terrorist organizations. In addition, they are also using the internet for training of terrorists since training camps are being actively pursued and neutralized by the intelligence community.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Best Essays

    Chomsky, N. (2009, 10 30). Hopes And Prospects (Amnesty International Lecture). Retrieved from Noam Chosmky Website: http://www.chomsky.info/talks/20091030.htm…

    • 5285 Words
    • 22 Pages
    Best Essays
  • Powerful Essays

    Cyber terrorism is the world’s newest threat against the United States. The FBI defines cyber terrorism as "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents" (Elmusharaf, 2004). This definition provided by the FBI can be broken down into several layers. The first layer is that of the actors, their motives are political in nature and are thought out and planned. They are targeting computer systems which would include vital infrastructures that allow the US to function. Their wanted result is that of causing panic, mayhem, and even death to innocent civilians as well as US forces. The battle landscape against the United States has changed from the normal battle fields of sand and dirt to that of the information super highway. This allows for terrorist attacks that no longer target physical assets, but instead targets our computer systems, cyber infrastructure, and other computer based systems. These systems can include municipal systems, nuclear power plants, hospitals, and financial sectors.…

    • 2860 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Malware Research Paper

    • 515 Words
    • 3 Pages

    In the fight against terrorism, the Department of Homeland Security is constantly looking for new technology. Many of these technological advancements in homeland security are based around cyber security technologies. With an increase in cyber warfare and hacking, technological advancements are a necessity if the government plans on combating crime.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Disec

    • 1366 Words
    • 6 Pages

    As the digital age progresses and computers become more prominent, the issue of cyber security comes into question. Governments have taken measures to make guidelines and laws regarding computer hacking within their own countries, but what can they do about issues dealing…

    • 1366 Words
    • 6 Pages
    Powerful Essays