Individual Assignment #1 (Week 2)
Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector Cybersecurity. Clearly discuss the methods of government intervention. That is, what authorities (such as laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry? Describe real-world examples that help support your discussion.
discussion of reasons and methods of government intervention, plus how both federal and some state interventions may be similar or differ in reasons and methods,
Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements. Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation. Describe real-world examples that help support your discussion.
Impacts and effects is thorough, including how federal and/or some state regulations may create unintended positive or negative effects for national security or for economic progress.
National Cybersecurity and Critical Infrastructure Protection Act of 2013, H.R. 3696. http://www.ndia.org/Advocacy/LegislativeandFederalIssuesUpdate/Documents/CybersecurityBillLetterofSupport1.9.14.pdf 1) Reason for government intervention
2) Methods of government intervention
1. Information sharing
a. To increase private sector sharing (why the govt need firms to share) i. Fear of disclosure (reason why firms chose not to share)
ii. Mitigating vulnerabilities for firms in general (reason why they should share) iii. Develop better security for other firms based on identified breaches....
References: Himma, K. E. (2006). Legal, social, and ethical issues of the Internet. In B. Hussein, Handbook of Information
Jaeger, C. (2006). Cyberterrorism and information security. In B. Hussein, Handbook of Information Security (Vol.
Waleski, B. D. (2006). The Legal Implications of Information Security: Regulatory Compliance and Liability. In B.
Please join StudyMode to read the full document