Cybersecurity Case Study

Great Essays
1. How would enacting S. 2105 have improved upon cybersecurity? That is, what topics raised in class would it have addressed, regarding cybersecurity?
The proposed act encourages consultation between the government and the private sector raising the level of awareness within management rank and file. As Bayuk location 387 (2012) points out, on-going communication and cooperation between the public and the private sectors will lead to a more resilient national cyber standing. As it stands today, data on cyber breaches and vulnerabilities are kept confidential and locked away. Not realizing how vulnerable various sectors are keeps managers in the dark about the threats facing their enterprise. Bayuk further emphasizes the need for closer collaboration
…show more content…
Privacy of individuals is protected by through proper measures and oversight. Bayuk, et al, emphasize the privacy issue and warn against “terse” responses and point out the potential for discriminatory behavior by the government and private entities.
The bill would have encouraged information sharing as opposed to mandating it. In line with bayuk’s approach, the goal of the policy should be set to reduce cyber security risk and not to meet a goal that is set externally, such as compliance with regulatory or industry’s best practices, although once cyber security risks (in line with business needs) are established, external compliance considerations can be easily achieved by performing an audit and closing gaps, if any are identified.
At times, various agencies play conflicting roles. Clearly wide gaps between the Department of Homeland Security, DoD, the intelligence community, and organizations such as NIST remain. Some provisions of the proposed legislation have been implemented, such as the creation of Cyber Threat Integration Center, announced February 2015, whose limited role is to assess and coordinate sharing of the threat data amongst various
…show more content…
But this is not necessarily a bad outcome as the reason for the drop in expenditure is due to the fact the companies reach their security objectives at a lower cost. (www.directscience.com 2003)
Similar to S.2105, it emphasizes the need to move away from a culture of compliance to a culture of outcome measurement with added benefit of putting in place the organizational framework to ensure that there is streamlined focus to strengthen resilience of federal government systems. The steps mandated by S. 3414 in the areas of “red team” exercises will undoubtedly raises awareness and lead to better security leading to stronger cybersecurity posture.
Without a doubt we are witnessing a shift in the needed expertise akin to the shift that took place at the dawn of industrial revolution or with the advent of computers, programming and the internet. In each case, the workforce had to be trained in new set of skills . Cybersecurity is no different. This Act would have advanced this cause on the road to developing a stronger cybersecurity workforce and enhancing our cybersecurity

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    In addition new legislation was introduced which was; the Patriot Act this helps U.S. measures to restrain and detect terrorism and also fight against corruption of U.S. financial institutions. Enhanced Border Security and Visa Entry Reform Act also developed the purpose of this is to share visa and immigrant data. Another response to 9/11 was Post-9/11 G.I. Bill which gives funding to…

    • 1288 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Contemporary Homeland Security Issues Haritha Vadlamudi Wilmington University Countering Terrorist Radicalization legislation The consequences of the Orlando terrorist attack affected the individuals from House of Representatives to act rapidly to make aware of performing with fortifying the nation's counter radicalization work in the increasingly unsafe environment. Countering Terrorist Radicalization Act is constructed primarily on the the work of bipartisan team launched on March 2015. Individuals from the team were accused of evaluating the risk that foreign fighters posture to the United States. Potential security holes distinguished were displayed in a report that structures the basis of the legislation (Vicinanzo…

    • 880 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    CISA Cost-Benefit Analysis

    • 1058 Words
    • 5 Pages

    The CISA is the Computer/Cybersecurity Information Sharing Act that would give government agencies the right to share cybersecurity threats with the public. The CISA bill requires the Director of National Intelligence and the Departments of Homeland Security (DHS), Defense, and Justice to develop procedures to share cybersecurity threat information with private entities, nonfederal government agencies, state, tribal, and local governments, the public, and entities under threats to detect, prevent, or mitigate cybersecurity threats or security vulnerabilities. Private entities may monitor and operate defensive measures on: (1) their own information systems; and (2) with written consent, the information systems of other private or government…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Soon after, the prevention and preparation of any future terrorism became a priority at all levels. Data revealed several new homeland security…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    During my thought process while writing this, I kept remembering a common statement from many clients, peers, and readings about the topic of the security: “Management doesn’t care. Security is not in the budget… they don’t get it.” This train of thought repeats in many of the articles I write…

    • 1190 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays