Preview

Govt Ethics

Powerful Essays
Open Document
Open Document
1775 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Govt Ethics
Assignment #1: Government and Private Industry Roles in Cyber Security

By Charles Sneed

13 Feb 2010

CSEC 620 Section 9040

TABLE OF CONTENTS
Table of Content……………………………………….……………………..…2

Introduction………….…………………………………………………………..3

Governmental Guidance……………………………………………………....3

Private Industry’s Responsibility………………………………………..….…8

Conclusion……………………………………………………………….……...9

References…………………..………………………………………….….….10

I. Introduction A. Objective
The purpose of this report is to describe how the government can help private industry to better manage improved cyber security and their responsibility to protect national security through implementing good cyber security controls. B. Organization of Subheadings
Section II provides an overview of how the government can provide guidance to private industry through the use of government regulation and cyber insurance. Section III tells why private industry has to have solid cyber security controls in place to protect national security. Section IV concludes with a review of the discussion and summary of responsibilities for both the government and private sector in relation to cyber security. II. Governmental Guidance
The government, more per se congress, must be clear about decisions of where to legislate or not. Government regulations and potential liability continue to be the biggest factor driving security investments, indicating that in addition to IT investments in security, security spending may be occurring in departments other than IT in order to comply with the Sarbanes-Oxley law (Swartz, 2004). True the federal government can set these lanes on the highway to protect cyber security but must also be flexible for both private and government to somehow overcome and begin to adapt to these ever-changing threats. It the government’s responsibility to ensure that information concerning cyber threats is shared with that of the private industry.



References: A. Governmental Regulation There have repeatedly been concerns from industry, private sector, and those operating critical infrastructure that over legislating by Congress ultimately will make it harder to protect our networks (Foster, 2002) Fisher, D. (2002). Feds warming to idea of regulating security. eWeek, 19(42), 14. Retrieved from EBSCOhost. Homeland Security Information Sharing: Protections for Private Sector Information. (2007). Venulex Legal Summaries, 1-2. Retrieved from EBSCOhost. Larence, E. R., & Powner, D. A. (2007). Critical Infrastructure: Challenges Remain in Protecting Key Sectors: GAO-07-626T. GAO Reports, 1. Retrieved from EBSCOhost. Pilla, D. (2003). Terrorism Risk Act Presents Questions. Best 's Review, 104(3), 14. Retrieved from EBSCOhost. Powner, D. A. (2006). Critical Infrastructure Protection: DHS Leadership Needed to Enhance Cyber security: GAO-06-1087T. GAO Reports, 1. Retrieved from EBSCOhost. Swartz, N. (2004). Businesses Improve Cyber Security. Information Management Journal, 38(6), 18. Retrieved from EBSCOhost

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Best Essays

    Sarbane-Oxley Act of 2002

    • 3019 Words
    • 11 Pages

    Kochems, Alane. “Who’s on First? A Strategy for Protection Critical Infrastructure. May 5, 2005. Accessed April 9, 2009 from: The Hertiage Foundation website at http://www.heritage.org/research/homelandsecurity/bg1851.cfm.…

    • 3019 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A Policy Brief of NSA Reform

    • 3654 Words
    • 12 Pages

    This is an issue that requires your continued participation. I am aware that this is an issue that you have become directly involved with and have worked to support the enactment of the USA Freedom Act. As a senator currently working with and recently “opposite” to Rand Paul, who has garnered much support by big tech companies in silicon valley, I believe that with the same stance, the both of you can work with the support of big tech companies to work to pass the enactment of the USA Freedom Act (Savage). While the act still currently includes controversial aspects left over from the original Patriot Act that allows for bulk surveillance practices, it is important that either the bill is passed and addressed from the inside as you have suggested along with Senator Sensenbrenner, or that new provisions are made under a new act that addresses this issue.…

    • 3654 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The author also explains that involving the people would be critical since presuming their submissiveness risks creating resentment and lack of cooperation over time. It is important to make the people to understand the appropriateness of security measures to increase their willingness to collaborate to achieve security goals. Further, the author advocates for opening up of homeland security work to avoid working in secrecy and involve the private sector and the general public. The author sees the move to insulate information from the public as undermining the defense of critical…

    • 872 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It is only with the effective coordination and cooperation between all levels of government and private sector companies that efforts to combat cyber-crime will succeed. The FBI recognizes and appreciates the interest and efforts of private sector companies in preventing cyber-crime as well as their willingness to work with law enforcement to address the…

    • 1718 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The September 11, 2001 attack by the Al-Qaida terrorists was a great challenge to the American government than any other disaster that had occurred in the past decades. The government was threatened to an extent that any possible future attacks that had been suggested by this terrorist group had to be dealt with before it could actually be perpetrated against the American citizens. Since the days of 9/11, the nation has spent a reported $635.9 billion on homeland security and has implemented many changes, strategies and processes to better prepare our nations Security. The government had few institutions that would have coped with this disaster before it happened but thereafter, it has moved towards solving this problem by establishing several institutions and initiatives including the U.S.A. Patriot Act, the Homeland Security Act, the Department of Homeland Security, the National Incident Management System, Homeland Security Presidential Directives 5 and 8, and the Transportation Security Administration, all aimed at countering any intended attacks whether within the country or abroad. Their implementations are at local level as well as state and federal level.…

    • 1848 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Department of Homeland Security. (2007). National strategy for homeland security. Retrieved January 25, 2009, from the Department of Homeland Security Web at http://www.dhs.gov/xabout/history/gc_1193938363680.shtm…

    • 1888 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    There are numerous challenges emerging in homeland security. In my opinion, one of the biggest challenges is how the Internet is used. The Internet is being used by terrorist groups worldwide to spread their propaganda. These groups are using ungoverned Internet space to disseminate training material and poisonous propaganda to attract and lure individuals from around the world to their cause. They encourage these individuals to commit acts of violence in their own communities. These terror groups have used the Internet to provide these individuals vital training and information in the privacy of their own residence. With the Internet, these individuals no longer must travel out of country to obtain the training.…

    • 334 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Homeland Security

    • 3491 Words
    • 14 Pages

    Renuart, G. (2009). HOW THE MILITARY SUPPORTS HOMELAND SECURITY. U.S. Naval Institute Proceedings, 135(10), 26-31. Retrieved from Academic Search Premier database.…

    • 3491 Words
    • 14 Pages
    Powerful Essays