US Cyber Security Policy

777 views

Published on

INFO 644, US Cyber Security Policy, changes in cyber security policy for the future

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
777
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
24
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

US Cyber Security Policy

  1. 1. By Sandy Suhling
  2. 2. US Policy Timeline  Department of Homeland Security established 2003  National Cyber Security Division created 2003 (Bayuk et al., 2012)  National Strategy to Secure Cyberspace 2003  Comprehensive National Cybersecurity Initiative 2008 (Office of Inspector General, 2010)  Cyberspace Policy Review 2009  International strategy for Cyberspace 2011  PPD 23 2013
  3. 3. Discussion of how power relationships in the US government have affected our cyber security policy
  4. 4. Circuits of Power: Episodic power  Creation of DHS and its evolution (Dhillon, 2013)  Effects on episodic power  Cyber security not considered urgent  Problem with Cyber Security leadership  Executive Order 2013
  5. 5. Circuits of Power: Social Integration  September 11th Terrorist attacks (Dhillon, 2013)  Creation of Department of Homeland Security  Homeland Security Act 2020  Competition among DHS missions  Desire to appear patriotic and loyal
  6. 6. Circuits of Power: System Integration  Cyber Security Enhancement Act of 2002 (Dhillon, 2013)  Resistance: privacy protection for citizens  Stop Online Piracy Act of 2012
  7. 7. US Cyber Security Efficacy  Lack of strong leadership  Competition with other missions  Threat not seen as visibly  Keep coming up with strategies  Need support of private sector  Backing with resources
  8. 8. Possibilities for improvement  Need for clear leadership  Support from administration and private sector  Regulations for government agencies and contractors holding sensitive and classified information (OIG, 2012)  Information security training program for government employees relevant to varying roles, make available to private sector  Regulate government use of firewalls and physical server security, recommendations for private sector  Improved information sharing and cyber threats (Fischer et al., 2013)  Focus on private-public partnerships, incentives for private sector adoption of cybersecurity measures
  9. 9. References  Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M. H., Schmidt, J., and Weiss, J. (2012). Cyber security policy guidebook. Hoboken, NJ: John Wiley & Sons. Retrieved from http://site.ebrary.com.proxy.library.vcu.edu/lib /vacommonwealth/docDetail.action?docID=10630610  Dhillon, G. (2013). Interprise cyber security: Principles and practice. Washington, DC: Paradigm Books.  Fischer, E.A., Liu, E.C., Rollins, J., and Theohary, C.A. (2013). The 2013 cybersecurity executive order: Overview and considerations for Congress. Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/R42984.pdf  Office of Inspector General. (2010). DHS needs to improve the security posture of its cybersecurity program systems. Department of Homeland Security. Retrieved from http://permanent.access.gpo.gov/gpo11236/OIG_10- 111_Aug10.pdf

×