StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Developing Cybersecurity Law and Policy - Assignment Example

Cite this document
Summary
Developing Cyber Security Laws and Policy Name: Institutional affiliation: Instructor: Developing Cyber Security Laws and Policy Topic 1: Federal Register The Federal Register is an official document used by the federal government to notify its agencies on daily notices in regard legal notices…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Developing Cybersecurity Law and Policy
Read Text Preview

Extract of sample "Developing Cybersecurity Law and Policy"

Download file to see previous pages

Other sections of the Register include the presidential document, reader aid and federal register xml files. These sections guide the users who are mainly federal agencies on new regulations and prerequisite information to participate in rulemaking (GPO, 2013). The Federal Register is used by the relevant agencies to call for public participation in policy creation (Mead, 2004), as the majority of civil users bring in ideas that may not be available within federal workforce. Citizens are also in a position to keep track of current updates on cyber security laws and regulations.

Daily updates ensure continuous information gathering and dissemination since cyber technology is highly dynamic (Cate, 2009). Topic 2: US Cyber Command US Cyber Command is a sub-unit in the US strategic command that was created by the Office of the Secretary of Defense in 2010. It is charged with planning, integrating, coordinating, synchronizing and directing military cyber space operations and managing federal information networks. This was an essential step in reinforcing the Department of Defense’s capability to remain in control of its information network reducing vulnerability to cyber warfare (Kenneally, 2001).

This is especially the case since intelligence information handled in the network should remain protected for national security (Kenneally, 2001). . The president appoints a cyber security coordinator commonly referred to as the cyber czar who is a government employee. It is necessary that this position be held by the government to control biased service by private institutions that may manipulate the information systems, hence making it more vulnerable to hackers (Kenneally, 2001). Academia may have its practice based on theoretical information, thus less flexible to the dynamics involved in cyber operations.

This handicaps its efficiency in service delivery. An individual who is open-minded is the most appropriate to hold this position since they have a realistic approach to cyber security management (Kenneally, 2001). Topic 3: Renewed Interest in Public-Private Partnerships Several frameworks have been put in place to improve cyber security in both the public and private sectors. Public-private partnership is essential for effective protection of U.S assets, infrastructure and economic interest from attack on cyber activities.

This kind of partnership enhances information sharing, minimizing the risks of the use of cyber facilities especially in the era of increased global connectivity. Partnership enables pooling of resources required for effective workforce education and training and investment in cyber security (Guttmann et al., 2003). Both the public and private sectors should be actively involved in policy making and setting cyber law that remains ahead of possible risks and in pace with technological developments.

It is of importance to create an enabling environment that respects the privacy and civil liberties of all partners involved while at the same time enhancing optimal collaboration in

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Developing Cybersecurity Law and Policy Assignment”, n.d.)
Retrieved from https://studentshare.org/law/1469479-developing-cybersecurity-law-and-policy
(Developing Cybersecurity Law and Policy Assignment)
https://studentshare.org/law/1469479-developing-cybersecurity-law-and-policy.
“Developing Cybersecurity Law and Policy Assignment”, n.d. https://studentshare.org/law/1469479-developing-cybersecurity-law-and-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Developing Cybersecurity Law and Policy

The Impact of Mobile Devices on Cyber Security

The impact of mobile devices on cyber security Name: Course: Professor: Institution: City and State: Date: Contents Introduction 3 The internet and identity theft 4 Threats of mobiles devices 4 Hacking and Cyber security Infrastructure 5 Hacking has been a very common threat to cyber security for the past few decades, something that Kelly (2012) claims calls for extensive reforms....
9 Pages (2250 words) Book Report/Review

Cybersecurity Threats and the Future of the Internet

The paper "cybersecurity Threats and the Future of the Internet" discusses that cloud computing is subject to an equal amount of external threats like any other modern-day technologies and interfaces.... Concept of Cyber Security: The term cybersecurity pertains to enacting actions that are necessary to be taken into account for safe and better services and operations in this medium....
17 Pages (4250 words) Coursework

New Technology of Crime Law and Social Control

The following essay "New Technology of Crime law and Social Control" concerns the use of technology by police courts and corrections to prevent crime and delinquency.... The New technology of Crime, law and SocialControl Monsey, NY: Criminal Justice Press.... The New Technology of Crime, law and Social Control, Monsey, NY: Criminal Justice Press, p.... nbsp; Use of Technology by Police Courts and Corrections to prevent Crime and DelinquencyImagine a world where criminals and delinquents are smarter than law enforcers and criminal justice organizations....
2 Pages (500 words) Essay

The Impacts of Mobile Devices on Cyber Security

The study “The Impacts of Mobile Devices on Cyber Security” aims at finding out the impacts of mobile devices such as smartphones, tablets, and iPads, on cybersecurity.... hellip; The research will study the impacts of mobile devices on cybersecurity in Banda town that is located in the United States....
8 Pages (2000 words) Assignment

The US Army and the Cyber Domain

From the paper "The US Army and the Cyber Domain" it is clear that aimed at greater efficiency and soundness in cyberspace activities, the US army has proposed a plan to integrate a program with their international partners so that they can enhance the collective cybersecurity....
6 Pages (1500 words) Case Study

Hacking in the US

This paper, Hacking in the US, stresses that the advancement in the technology and its widespread use has caused certain serious problems to many countries of the world, especially to technically advanced countries such as the United States.... nbsp;… This discussion outlines this cyber attacks through electronic devices have threatened the many political parties and have emerged as a headache for them....
14 Pages (3500 words) Research Paper

Law Enforcement and E-Government Transnational Issues

Current initiatives addressing United States' cybersecurity concerns include the Comprehensive National Cybersecurity Initiative (CNCI), Commission on Cybersecurity for the 44th Presidency and the Obama Administration 60-Day Cyberspace policy Review.... The author of the "Cybercrime: law Enforcement and E-Government Transnational Issues" paper discuss cybersecurity laws, regulations, and legal concepts applicable to managerial decision making concerning the industry, transnational crime, and government....
7 Pages (1750 words) Coursework

Impact of Legislation on Internal Revenue Service

The paper aims to analyze and review the IRS's information security program and its program evaluation programs in accordance with Cyber Security Legislative Proposal of 2012, the Presidential policy Directive pertaining to critical infrastructure resilience and security and… In addition, points of analysis have been chosen from the three sources to better inform the way forward for cyber security enforcement in not only government agencies but also private The paper "Impact of Legislation on Internal Revenue Service" is a perfect example of an essay on law....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us