SlideShare a Scribd company logo
1 of 19
Eric T. Winn
• Threats to the security of the United States and
its citizens can come in many forms:
• Planes crashing into buildings
• Bombs detonated in crowded areas
• Mass murders can enter schools and kill innocent
children
• Cyber attacks on the banking industry, businesses,
government agencies, etc.
• The FBI, CIA, NSA and other federal, state and
local agencies are working diligently to detect
and prevent an event such as 9/11 from
occurring again
• In order to disrupt any type of criminal
activity, whether terrorism or any other type of
crime, we must think like the criminal
• We must understand where we have
weaknesses and what we need to do to prevent
them from being exploited
• Since 9/11, tremendous efforts have been made
to secure sections of our critical infrastructure
that fell victim to terrorists
• While these efforts are needed and necessary,
we must not be narrowly focused on from
where the next attack will come or take place
• Efforts must be made to protect all aspects of
our critical infrastructure to include cyber
systems
• Cyber security has been defined as security of
the nation’s computer and telecommunications
infrastructure to include military, all forms of
communications networks, electrical grids and
power plants.
• These attacks can involve both the public and
private sectors
• Government agencies
• Banks
• Businesses
• Power companies
• Any other organization that utilizes computer and
telecommunications systems
• The theory describes power in three different
circuits:
• Episodic circuit
• Social integration circuit
• System integration circuit
• The theory describes power relationships and
how they are interconnected
• The episodic circuit describes how events can
shape policy
• The events of 9/11 demonstrated how the lack of
communication left the nation in a vulnerable state
• The creation of the Department of Homeland
Security illustrates the episodic power of an
organization
• Redirecting funds and resources, implementing
personnel policy, oversight and other functions
were placed under the control of a single person
• The creation of DHS also affected congressional
functions
• This resulted in redirecting funds to certain
areas of the country under the pretense of
protection from terrorism
• Terrorism is a grave threat to the nation but
attacks are waged against organizations every
day that are not affiliated with a terrorist
organization
• We must take a holistic approach when
securing a nation
• We cannot focus solely on threats from one
source
• While terrorism is a serious threat to the nation,
threats to the security of the nation come from
many other areas and occur by many different
means
• Cyber security was placed on the back burner
and greater attention was placed on securing
the nation from a single type of threat and from
a single organization
• In the years following 9/11, it was unclear as to
who was in charge of cyber security efforts and
what was being accomplished to reach that
goal
• Episodic power played a key role in the
implementation of cyber security in the United
States
• Social and cultural differences can have grave
consequences on how policy is created
• Legislative actions were taken prior to 9/11 to
create a department tasked with protecting the
homeland but basically died in Congress due
to lack of interest
• It took the loss of thousands of lives and
billions in infrastructure to realize that efforts
were needed to protect the nation’s homeland
• Following 9/11, a bill was introduced to focus
on cyber security efforts
• The bill was debated but no action was taken
• Nearly a year later, another bill was introduced
that resulted in the creation of DHS
• Still, there was a lack of interest in securing the
nation’s cyber network
• Cyber security lost when trying to compete
with other national security functions
• It is argued that voicing concern about DHS
not focusing enough on cyber security would
appear unpatriotic
• The technological means of control over the
physical and social environment and the skills
associated with these means
• System integration is a strong source of
transformation and tension
• System integration relies heavily on the
management of an organization to explain the
new rules and norms implied by the system
• It must be done in such a manner that members
of the organization understand and are willing
to accept
• The Cyber Security Enhancement Act allowed
companies to provide government with customer’s
electronic information without a warrant or other
legal document
• It did not have to be provided following a request,
it could be the initiative of the company as an
“immediate threat to a national security interest”
which was later changed to “subjective good faith”
• This did not require judicial oversight or
notification to the person communicating the
information
• Buy-in from others in the organization is
needed during the design and development
stage of the system and not when the system is
being implemented
• Why does it take an event to occur before our
government begins to focus attention on the
situation?
• Dhillon, G. (2013). Enterprise cyber security:
Principles and practice. Washington, D.C.
Paradigm Books

More Related Content

What's hot

Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
groot83
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
blogzilla
 

What's hot (19)

Why Are We Being Watched?
Why Are We Being Watched?Why Are We Being Watched?
Why Are We Being Watched?
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...Article assignment obama and the smith mundt act repeal telecommunications un...
Article assignment obama and the smith mundt act repeal telecommunications un...
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Legal Issues of Government Use of Social Media
Legal Issues of Government Use of Social MediaLegal Issues of Government Use of Social Media
Legal Issues of Government Use of Social Media
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cyberbullying and the law
Cyberbullying and the lawCyberbullying and the law
Cyberbullying and the law
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Essential components of a policy problem definition
Essential components of a policy problem definitionEssential components of a policy problem definition
Essential components of a policy problem definition
 
ARTICLE 4/27/12
ARTICLE 4/27/12ARTICLE 4/27/12
ARTICLE 4/27/12
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Wild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspaceWild West or gulag: models for policing cyberspace
Wild West or gulag: models for policing cyberspace
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Causes of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and SecurityCauses of the Growing Conflict Between Privacy and Security
Causes of the Growing Conflict Between Privacy and Security
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 

Similar to United states cyber security policy (Eric Winn)

CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
Enrique J Cordero
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
philipnelson29183
 
The Issue Of Homeland Security
The Issue Of Homeland SecurityThe Issue Of Homeland Security
The Issue Of Homeland Security
Mary Brown
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
difordham
 

Similar to United states cyber security policy (Eric Winn) (20)

CT3- STEVENS
CT3- STEVENSCT3- STEVENS
CT3- STEVENS
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
Chapter 9 the role of the policy maker
Chapter 9 the role of the policy makerChapter 9 the role of the policy maker
Chapter 9 the role of the policy maker
 
Chapter14
Chapter14Chapter14
Chapter14
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Political Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the BangsamoroPolitical Transitions After a Peace Agreement: Opportunities for the Bangsamoro
Political Transitions After a Peace Agreement: Opportunities for the Bangsamoro
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
What are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docxWhat are some of the challenges the intelligence community faces i.docx
What are some of the challenges the intelligence community faces i.docx
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
Rise of the Private Police
Rise of the Private PoliceRise of the Private Police
Rise of the Private Police
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
The Issue Of Homeland Security
The Issue Of Homeland SecurityThe Issue Of Homeland Security
The Issue Of Homeland Security
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
White7e ppt ch15
White7e ppt ch15White7e ppt ch15
White7e ppt ch15
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

United states cyber security policy (Eric Winn)

  • 2. • Threats to the security of the United States and its citizens can come in many forms: • Planes crashing into buildings • Bombs detonated in crowded areas • Mass murders can enter schools and kill innocent children • Cyber attacks on the banking industry, businesses, government agencies, etc.
  • 3. • The FBI, CIA, NSA and other federal, state and local agencies are working diligently to detect and prevent an event such as 9/11 from occurring again • In order to disrupt any type of criminal activity, whether terrorism or any other type of crime, we must think like the criminal • We must understand where we have weaknesses and what we need to do to prevent them from being exploited
  • 4. • Since 9/11, tremendous efforts have been made to secure sections of our critical infrastructure that fell victim to terrorists • While these efforts are needed and necessary, we must not be narrowly focused on from where the next attack will come or take place • Efforts must be made to protect all aspects of our critical infrastructure to include cyber systems
  • 5. • Cyber security has been defined as security of the nation’s computer and telecommunications infrastructure to include military, all forms of communications networks, electrical grids and power plants.
  • 6. • These attacks can involve both the public and private sectors • Government agencies • Banks • Businesses • Power companies • Any other organization that utilizes computer and telecommunications systems
  • 7. • The theory describes power in three different circuits: • Episodic circuit • Social integration circuit • System integration circuit • The theory describes power relationships and how they are interconnected
  • 8. • The episodic circuit describes how events can shape policy • The events of 9/11 demonstrated how the lack of communication left the nation in a vulnerable state • The creation of the Department of Homeland Security illustrates the episodic power of an organization • Redirecting funds and resources, implementing personnel policy, oversight and other functions were placed under the control of a single person
  • 9. • The creation of DHS also affected congressional functions • This resulted in redirecting funds to certain areas of the country under the pretense of protection from terrorism • Terrorism is a grave threat to the nation but attacks are waged against organizations every day that are not affiliated with a terrorist organization • We must take a holistic approach when securing a nation
  • 10. • We cannot focus solely on threats from one source • While terrorism is a serious threat to the nation, threats to the security of the nation come from many other areas and occur by many different means • Cyber security was placed on the back burner and greater attention was placed on securing the nation from a single type of threat and from a single organization
  • 11. • In the years following 9/11, it was unclear as to who was in charge of cyber security efforts and what was being accomplished to reach that goal • Episodic power played a key role in the implementation of cyber security in the United States
  • 12. • Social and cultural differences can have grave consequences on how policy is created • Legislative actions were taken prior to 9/11 to create a department tasked with protecting the homeland but basically died in Congress due to lack of interest • It took the loss of thousands of lives and billions in infrastructure to realize that efforts were needed to protect the nation’s homeland
  • 13. • Following 9/11, a bill was introduced to focus on cyber security efforts • The bill was debated but no action was taken • Nearly a year later, another bill was introduced that resulted in the creation of DHS • Still, there was a lack of interest in securing the nation’s cyber network • Cyber security lost when trying to compete with other national security functions
  • 14. • It is argued that voicing concern about DHS not focusing enough on cyber security would appear unpatriotic
  • 15. • The technological means of control over the physical and social environment and the skills associated with these means • System integration is a strong source of transformation and tension • System integration relies heavily on the management of an organization to explain the new rules and norms implied by the system • It must be done in such a manner that members of the organization understand and are willing to accept
  • 16. • The Cyber Security Enhancement Act allowed companies to provide government with customer’s electronic information without a warrant or other legal document • It did not have to be provided following a request, it could be the initiative of the company as an “immediate threat to a national security interest” which was later changed to “subjective good faith” • This did not require judicial oversight or notification to the person communicating the information
  • 17. • Buy-in from others in the organization is needed during the design and development stage of the system and not when the system is being implemented
  • 18. • Why does it take an event to occur before our government begins to focus attention on the situation?
  • 19. • Dhillon, G. (2013). Enterprise cyber security: Principles and practice. Washington, D.C. Paradigm Books