SlideShare a Scribd company logo
Elizabeth Stevens
Dr. Gurpreet Dhillon
INFO – 644, CT3
• Subramanian (2010) defines cyber security as:
• “The security of a nation’s computer and telecommunications
infrastructure as well as the data stored within the computers from
outside attack” (Dhillon, 2013, p. 188).
• Cyber security includes protection of:
• Hardware
• Software
• Information in both public and private sectors
• Military
• Communications networks
• Electrical grids
• Power plants
• The history of U.S. cyber security policy is examined
through Clegg’s theory of circuits of power.
• Circuits of power “explains power relationships
independent of the particular circumstances of
organizations or their structure. The application of the
theory leads to a complete political appraisal of the
organization” (Dhillon, 2013, p. 190).
• Power circulates in three different circuits:
• Episodic circuit
• Social integration circuit
• System integration circuit
• Episodic power – describes the day-to-day interaction,
work, and outcomes (p. 190); can be recognized by
outcomes and actions.
• The attacks of 9/11 led to the creation of the Department
of Homeland Security (DHS); 22 separate departments
merged into one agency.
• The new position of Secretary of DHS would come with
great political power:
• Appointing responsibilities
• Directing funds and resources
• Implementing personnel policy
• Oversight
• Creation of DHS led to issues within Congress and other
parts of the federal government:
• Committee Chairs did not want to give up their powers.
• If one committee exercised power, it was resisted by other ones.
• Funds were misappropriated across different agencies nationwide.
• Richard Clarke, author of “National Plan to Secure Cyberspace”
was forced to resign.
• Between 2003-2005, there was no real cyber security strategy;
lack of leadership and “turf wars” kept cyber security czars from
developing cyber security strategies.
• Major cyber security breaches in 2007 and 2008 affected State
Dept., DoD, DHS, NASA and the VA.
• These breaches prompted directives HSPD 23 and
NSPD 54 that led to Comprehensive National
CyberSecurity Inititative (CNCI) and the National Cyber
Security Center (NCSC).
• The NSA wanted to be in charge of cyber security.
• In 2009, Obama promised to develop a national cyber
security policy and appoint a federal cyber security
coordinator.
• This position would be above NSA and DHS and
depends on the collaboration between different
organizations.
• According to Dhillon (2013), “episodic power
relationships played a crucial part in the first decade of
• A month after 9/11, Senator Lieberman introduced a bill
to establish a DHS that had aspects of cyber security:
• Maintaining a hub of cyber security experts
• Sharing of information concerning cyber security in the U.S.
• Establishing cyber security standards with the FCC
• Certifying national preparedness for cyber attacks
• After DHS was created, cyber security matters took a low
priority
• DHS officials and loyalists to Bush, did not criticize its
lacking cyber security initiatives as most of the country
supported the government’s national security endeavors
unquestionably.
• System integration has two subcomponents:
• Production
• Discipline
• The Cyber Security Enhancement Act (CSEA) of 2002
grants companies permission to release customers’
electronic info to government employees without
warrants or legal documents.
• Reports were exempt from Freedom of Information Act requests
• Companies providing info were free from being sued by customers
• Customers did not have to be notified that their info was released
• Stop Online Piracy Act (SOPA) of 2012 was met with a
huge public backlash; major internet companies opposed
SOPA.
• Cyber security policy was drastically affected by:
• Turf wars
• Executive orders
• Legislative procedures
• Patriotic culture
• Public backlash
• Major shifts in power within the federal government
• Obama’s 2013 executive order to put cyber security
policy into law will design a framework for the
government and the private sector to “allow intelligence
to be gathered on cyber threats to privately owned critical
infrastructure…so they can better protect themselves”
(Dhillon, 2013, p. 202).

More Related Content

What's hot

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
Meg Weber
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
Sarah Granger
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
rmackinnon
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
M S Siddiqui
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
Md.Azizul hakim Anik
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
Sadegh Bamohabbat
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
Nilima Tariq
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
Abegail Roberts
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
DeniseMitchell
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
Md. Mehedi Al Hasan Rakib
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
Otieno Antony
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
katieingersoll
 
Cyber crime
Cyber crimeCyber crime
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
HB Litigation Conferences
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
Robbie Mitchell
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
Errol Hewitt. MSCP, BA
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
blogzilla
 

What's hot (20)

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 

Similar to CT3- STEVENS

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
john.niemela
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
Talwant Singh
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
- Mark - Fullbright
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
Dawn Yankeelov
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 
CST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity PolicyCST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity Policy
oudesign
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
Maurice Dawson
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
Chuck Brooks
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
Rama Reddy
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
benefitexpress
 
Module II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxModule II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptx
ChayaSorir
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
gertrudebellgrove
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
Gwanhoo Lee
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
Landon Harrell
 

Similar to CT3- STEVENS (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
CST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity PolicyCST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity Policy
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Module II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxModule II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptx
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 

Recently uploaded

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

CT3- STEVENS

  • 1. Elizabeth Stevens Dr. Gurpreet Dhillon INFO – 644, CT3
  • 2. • Subramanian (2010) defines cyber security as: • “The security of a nation’s computer and telecommunications infrastructure as well as the data stored within the computers from outside attack” (Dhillon, 2013, p. 188). • Cyber security includes protection of: • Hardware • Software • Information in both public and private sectors • Military • Communications networks • Electrical grids • Power plants
  • 3. • The history of U.S. cyber security policy is examined through Clegg’s theory of circuits of power. • Circuits of power “explains power relationships independent of the particular circumstances of organizations or their structure. The application of the theory leads to a complete political appraisal of the organization” (Dhillon, 2013, p. 190). • Power circulates in three different circuits: • Episodic circuit • Social integration circuit • System integration circuit
  • 4. • Episodic power – describes the day-to-day interaction, work, and outcomes (p. 190); can be recognized by outcomes and actions. • The attacks of 9/11 led to the creation of the Department of Homeland Security (DHS); 22 separate departments merged into one agency. • The new position of Secretary of DHS would come with great political power: • Appointing responsibilities • Directing funds and resources • Implementing personnel policy • Oversight
  • 5. • Creation of DHS led to issues within Congress and other parts of the federal government: • Committee Chairs did not want to give up their powers. • If one committee exercised power, it was resisted by other ones. • Funds were misappropriated across different agencies nationwide. • Richard Clarke, author of “National Plan to Secure Cyberspace” was forced to resign. • Between 2003-2005, there was no real cyber security strategy; lack of leadership and “turf wars” kept cyber security czars from developing cyber security strategies. • Major cyber security breaches in 2007 and 2008 affected State Dept., DoD, DHS, NASA and the VA.
  • 6. • These breaches prompted directives HSPD 23 and NSPD 54 that led to Comprehensive National CyberSecurity Inititative (CNCI) and the National Cyber Security Center (NCSC). • The NSA wanted to be in charge of cyber security. • In 2009, Obama promised to develop a national cyber security policy and appoint a federal cyber security coordinator. • This position would be above NSA and DHS and depends on the collaboration between different organizations. • According to Dhillon (2013), “episodic power relationships played a crucial part in the first decade of
  • 7. • A month after 9/11, Senator Lieberman introduced a bill to establish a DHS that had aspects of cyber security: • Maintaining a hub of cyber security experts • Sharing of information concerning cyber security in the U.S. • Establishing cyber security standards with the FCC • Certifying national preparedness for cyber attacks • After DHS was created, cyber security matters took a low priority • DHS officials and loyalists to Bush, did not criticize its lacking cyber security initiatives as most of the country supported the government’s national security endeavors unquestionably.
  • 8. • System integration has two subcomponents: • Production • Discipline • The Cyber Security Enhancement Act (CSEA) of 2002 grants companies permission to release customers’ electronic info to government employees without warrants or legal documents. • Reports were exempt from Freedom of Information Act requests • Companies providing info were free from being sued by customers • Customers did not have to be notified that their info was released • Stop Online Piracy Act (SOPA) of 2012 was met with a huge public backlash; major internet companies opposed SOPA.
  • 9. • Cyber security policy was drastically affected by: • Turf wars • Executive orders • Legislative procedures • Patriotic culture • Public backlash • Major shifts in power within the federal government • Obama’s 2013 executive order to put cyber security policy into law will design a framework for the government and the private sector to “allow intelligence to be gathered on cyber threats to privately owned critical infrastructure…so they can better protect themselves” (Dhillon, 2013, p. 202).