Sunday, April 21, 2019

Developing Cybersecurity Law and Policy Assignment

Developing Cybersecurity Law and Policy - assignment ExampleOther sections of the Register include the presidential document, reader aid and federal register xml files. These sections lam the users who are mainly federal agencies on new regulations and prerequisite data to participate in rulemaking (GPO, 2013). The national Register is used by the relevant agencies to c both for public participation in policy foundation (Mead, 2004), as the majority of civil users bring in ideas that may not be available inside federal workforce. Citizens are also in a position to keep track of current updates on cyber security laws and regulations. Daily updates ensure continuous info gathering and dissemination since cyber technology is highly can-do (Cate, 2009). Topic 2 US Cyber Command US Cyber Command is a sub-unit in the US strategic command that was created by the Office of the Secretary of Defense in 2010. It is charged with planning, integrating, coordinating, synchronizing and dir ecting soldiers cyber space operations and managing federal information networks. This was an all important(p) step in reinforcing the Department of Defenses capability to remain in control of its information network reducing vulnerability to cyber warfare (Kenneally, 2001). This is peculiarly the case since intelligence information handled in the network should remain protected for national security (Kenneally, 2001). ... The president appoints a cyber security coordinator commonly referred to as the cyber czar who is a government employee. It is necessary that this position be held by the government to control biased suffice by private institutions that may manipulate the information systems, hence making it more vulnerable to hackers (Kenneally, 2001). Academia may have its practice based on theoretical information, thus less flexible to the dynamics involved in cyber operations. This handicaps its efficiency in service delivery. An individual who is open-minded is the most a ppropriate to hold this position since they have a realistic set about to cyber security management (Kenneally, 2001). Topic 3 Renewed Interest in Public-Private Partnerships Several frameworks have been piece in place to improve cyber security in both the public and private sectors. Public-private partnership is essential for effective protection of U.S assets, infrastructure and economic interest from attack on cyber activities. This kind of partnership enhances information sharing, minimizing the risks of the use of cyber facilities especially in the era of increased global connectivity. Partnership enables pooling of resources required for effective workforce education and training and investment in cyber security (Guttmann et al., 2003). Both the public and private sectors should be actively involved in policy making and setting cyber law that remains ahead of possible risks and in pace with technological developments. It is of importance to create an enabling environment tha t respects the privacy and civil liberties of all partners involved while at the same time enhancing optimal collaboration in

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.