Government and the Cyber Sector

 Respond to each Individual Project Week 1 Individual Project – Overview of Cybersecurity Today The Executive Branch has inherent responsibilities to protect the nation and national infrastructure, including cyber networks and systems as well as the information that transits or is stored on that infrastructure. The theory of national policy-making is complicated, but it is fairly straightforward and appears largely procedural. The Executive Branch or the Legislative Branch identifies a problem or issue, and someone develops proposed laws or directives that address the problem. The proposed solution is vetted through a structured process including Congressional Committees, expert components of the Executive Branch, and even public review. This process results in law that is then implemented through Executive Branch policy implementation guidance. Cybersecurity policy development is complicated by many factors, including the authorities and capabilities and credibility of departmental policy champions like the Department of Homeland Security (DHS), the Department of Defense (DoD), and so forth; the need for consensus among cybersecurity stakeholders to define the problem (not to mention arrive at a potential policy solution); and the dynamics of the information technology and security fields themselves. Essentially, the theory of making meaningful cybersecurity policy is vastly different from the reality. Week 2 Individual Project – Societal Impacts on Cybersecurity Remember, as homeland security practitioners work to refine and implement priority protection initiatives, it is important to keep in mind guiding principles of the U.S. constitution. No government in any democratic country should ever deny it citizens the right to freedom of expression it is a constitutional right in most democratic countries, for example the First amendment. In the United States, also known as the bill of right, this guarantees right to freedom of expression or free speech. Any law or regulation in place to control or filter the content people see on the Internet is a breach to individual freedom. In other words, the Internet cannot be regulated without curtailing individual right to free speech. There will be more harm done than good with these regulations. Freedom of expression or free speech is one the fundamental base of the Internet; it is vital for the survival of the Internet… Week 3 Individual Project – Private-Sector Cybersecurity Responsibilities Regarding the public sector and the federal government, the Federal Information Security Management Act (FISMA) is the main law governing the federal government’s information security program and required agencies to develop and implement appropriate information security protections according to the risk and degree of harm from unauthorized access. A main concern with FISMA is that it is inefficient and unable to result in adequate cybersecurity protections….. Week 3 Individual Project – Private-Sector Cybersecurity Responsibilities Regarding the public sector and the federal government, the Federal Information Security Management Act (FISMA) is the main law governing the federal government’s information security program and required agencies to develop and implement appropriate information security protections according to the risk and degree of harm from unauthorized access. A main concern with FISMA is that it is inefficient and unable to result in adequate cybersecurity protections….. Week 4 Individual Project – Roles of International Law, the State, and the Private Sector in Cyberspace There are certainly more than a few gaps when it comes to designing and implementing cybersecurity strategy such as designing and implementing risk-based federal and critical infrastructure programs. Shortcomings persist in assessing risks, developing and implementing controls, and monitoring results in both the federal government and critical infrastructure. Federal government leaders have issued a variety of strategy-related documents over the last decade, many of which address aspects of cyber challenged areas. The documents address priorities for enhancing cybersecurity within the federal government as well as for encouraging improvements in the cybersecurity of critical infrastructure within the private sector. However, no overarching cybersecurity strategy has been developed that articulates priority actions, assigns responsibilities for performing them, and sets timeframes for their completion. As early as 2004, GAO developed a set of desirable characteristics that can enhance the usefulness of national strategies in allocating resources, defining policies, and helping to ensure accountability. Existing cybersecurity strategy documents have included selected elements of these desirable characteristics, such as setting goals and subordinate objectives, but have generally lacked other key elements…..

#Government #Cyber #Sector

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

1. Military Policy Analysis and Resource Paper Identify empirical research articles, books, videos, addressing military policies and issues concerning

1. Military Policy Analysis and Resource Paper Identify empirical research articles, books, videos, addressing military policies and issues concerning child welfare, domestic violence, mental 1.      Military Policy Analysis and Resource Paper   Identify empirical research articles, books, videos, addressing military policies and issues concerning child welfare, domestic violence, mental health.