Sunday, June 9, 2019

Developing Cybersecurity Law and Policy Assignment

Developing Cyber hostage Law and Policy - Assignment ExampleOther sections of the shew include the presidential document, reviewer aid and federal register xml files. These sections guide the users who are mainly federal agencies on new regulations and prerequisite information to participate in rulemaking (GPO, 2013). The Federal Register is used by the relevant agencies to call for public participation in policy creation (Mead, 2004), as the majority of civil users bring in ideas that whitethorn not be available within federal workforce. Citizens are also in a property to keep track of current updates on cyber security lawfulnesss and regulations. Daily updates ensure continuous information gathering and dissemination since cyber technology is highly dynamic (Cate, 2009). Topic 2 US Cyber predominate US Cyber Command is a sub-unit in the US strategic command that was created by the Office of the Secretary of Defense in 2010. It is charged with planning, integrating, coordinating , synchronizing and directing military cyber lieu operations and managing federal information net incomes. This was an essential step in reinforcing the Department of Defenses capability to remain in control of its information network reducing vulnerability to cyber warfare (Kenneally, 2001). This is especially the case since intelligence information handled in the network should remain protected for national security (Kenneally, 2001). ... The president appoints a cyber security coordinator commonly referred to as the cyber czar who is a government employee. It is necessary that this position be held by the government to control biased service by private institutions that may manipulate the information systems, hence making it more vulnerable to hackers (Kenneally, 2001). Academia may have its practice based on hypothetic information, thus less flexible to the dynamics affect in cyber operations. This handicaps its efficiency in service delivery. An individual who is open-minde d is the most appropriate to hold this position since they have a realistic approach to cyber security management (Kenneally, 2001). Topic 3 Renewed Interest in Public-Private Partnerships Several frameworks have been put in place to improve cyber security in both the public and private sectors. Public-private partnership is essential for effective protection of U.S assets, infrastructure and economic interest from assault on cyber activities. This kind of partnership enhances information sharing, minimizing the risks of the use of cyber facilities especially in the era of increased global connectivity. Partnership enables pooling of resources required for effective workforce teaching and training and investment in cyber security (Guttmann et al., 2003). Both the public and private sectors should be actively involved in policy making and setting cyber law that remains ahead of possible risks and in pace with technological developments. It is of importance to create an enabling env ironment that respects the privacy and civil liberties of all partners involved while at the same time enhancing optimal collaboration in

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.