Cyberspace: A Policy Analysis

Improved Essays
Policies, Strategies, Future Success
The United States leads a group of nations that advocate international law applies to Cyberspace, as noted by Harold Koh, a Legal Advisor for the U.S. Department of State, in his detailed remarks at USCYBERCOM Inter-Agency Legal Conference (Koh, 2012). The U.S. also pushes the edge in developing state and international strategies, which include cyberspace. How effective are the strategies if we continue to see state and non-state actors conducting cybered conflict? Current policies and strategies, as can be seen from the U.S., show positive movement in global security initiatives. Even with the initiatives, many states lack regulatory guidance and oversight to maintain and improve cyber defense for state
…show more content…
has The National Security Strategy 2015, The National Military Strategy of the United States of America 2015, The DoD Cyber Strategy 2015, and the Department of Defense Strategy for Operating in Cyberspace July 2011. All of these strategies discuss the concern on impact to socioeconomic security, deterrence, and investigation. What is mentioned, but not supported in these documents are how do we regulate and protect, or what will we do to ensure compliance. Why would our strategy ever allow for a “voluntary cybersecurity framework” (White House, 2015)? Guidance without mandated regulation or oversight is not productive to making successful changes in state or global cyber defenses (Clarke & Knake, …show more content…
Considerations for the following measures must be taken into account and applied throughout with appropriate oversight and regulatory guidance. The guidance must provide a goal and not dictate the path, it must hold both government and civilian organizations accountable for their security and emplace strict measures for those that fail to comply (Clarke & Knake, 2010). First, each state will need to clean up their internal networks, this is a broad area with many implied tasks for all parties involved. Second, the commercial and government agencies that build and oversee a state’s critical infrastructure and networks must decuple them from the internet. This will place them into closed networks allowing for stronger defense in depth. Third, states will need to participate more actively in international organizations (G8, FiRST, CERT, IEEE, ITU, etc.) that have relevance to cyber defense. The final measure for a state is to create a Bureau for Cyber Affairs under the State Department, or similar depending on the state. This will provide an organization responsible for oversight, compliance, and ensure that all cyberspace concerns, issues, policies, etc. are brought under one governing body (Clarke & Knake,

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    The Chairman of Joint Chiefs of Staff, General Martin Dempsey, summed up his assessment of the 2014 Quadrennial Defense Review (QDR) in the following statement: “With our “ends” fixed and our “means” declining, it is therefore imperative that we innovate within the “ways” we defend the Nation.” Strategic planning and transition to Joint Force 2020 (JF 2020) in a fiscally constrained environment affords DoD senior leaders the opportunity to be more innovative than ever before in assessing and mitigating risks to effectively confront a multitude of increasingly multifaceted security challenges. In the long run, a leaner, agile, adaptable, interoperable, and technologically sophisticated JF 2020 is necessary for the Combatant Commanders to…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The Federal Information Security Management (FISMA) was set up by the United States government for cyber security purposes such as to increase the level of security of software applications, systems and databases. As stated by (Kim, n.d.), “When FISMA was enacted, its purpose was to ensure that federal agencies secure the information contained in the non-defense information systems of the Unites States government”. To protect the systems and data it is important to have a security plan developed for not just federal agencies but also for the government contractors and organizations affiliated with the information. According to (Kim, n.d.), “These grades have trended slightly upward in recent years, with the grades from 2005 through 2007 being…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    DHS National Security

    • 747 Words
    • 3 Pages

    DHS's programs and agenda at refining local security from possible terrorist attacks have a long history of problems. The agency technology systems and programs aimed to monitor and detect chemical, biological, radiological, or nuclear attacks have failed to be effective or cost-efficient, considering the huge investment that was accorded to the project. DHS has equally struggled with its mandate of pinpointing and highlighting life-threatening infrastructure safeguard, counting expenditure of eight years and over a half a billion dollars on a program to protect chemical amenities which has yielded minimal results. The Department of Homeland Security has even thrashed to manage its duties effectually for safeguarding federal amenities and shielding the President of the United States. Assuming the importance of the country's counterterrorism and defensive security operations, Congress and the Department should review and reassess DHS's programs interconnected to its first mission and further eliminate initiatives which are non-essential in enhancing homeland…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The newly created National Military Establishment was rife with conflicts stemming from overlapping responsibility. The most notable of these was the rivalry between the Department of State and the new, massively larger, Department of Defense. Which of these two Departments gets priority in foreign policy making continues to be a struggle in the National Security Council. As the policy makers that designed NSA 47 intended, different Presidents have implemented the NSC in different ways.…

    • 893 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Dni Effect

    • 1657 Words
    • 7 Pages

    As the number of arrests shows, domestic terrorism is not going away and as the enemy evolves and transforms into a more sophisticated terrorist, the law enforcement and intelligence communities at all levels must do so as well. Experts in the domestic terrorism field warn against the intersections where the cyber-terror, narco-traffickers and terrorist will meet. Currently, the intelligence agencies that monitor these different types of threats are disconnected and the IC is not positioned to detect an intersection among these disparate groups. This is clearly a vulnerability that exists within the framework of the domestic counter-terrorism IC; joint collaboration must continue to evolve to ensure an attack does not occur in these…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Department of Homeland Security is an appropriate organizational design for several essential elements which are transferring immigration and naturalization service, border patrol, U.S. customs service, animal and plant health inspection service, U.S. Coastguard, and transportation security administration. The intelligence community mission is to supply the homeland security enterprise with timely intelligence information that is needed to protect, safe, resilient, and secure the United States. Also, national strategy defined homeland security as preventing the United States against terrorist attacks, decrease the America vulnerability to terrorism, reduce damage, and recover from terrorist attacks when it does occur (Burch, 2008). Moreover,…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The lack of major U.S. presence in international economic issues causes many nations to collapse as well. The continent of Africa is the center of gravity for these failed states and radical groups.2 Major powers, such as China, are problematic as they aggressively claim areas surrounded their country. The United States focused on itself for the last decade and a half, but now faces the realities of looming national security threats from both state and non-state actors. The United States needs to refocus itself on the myriad of potential attacks that could endanger the country, including Iran and North Korea’s nuclear capabilities, terrorist attacks, cyber-attacks, and China’s strategy concerning aggressive land claims. The United States saw a departure from its role as “global policeman” with the election of…

    • 2250 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    The continuing technological revolution in communications and information exchange over the past years has led to a growth in a new form of crime, cybercrime. Hence, criminals across the globe have invented various ways to use computer technology for theft, fraud as well as harassment. According to Holder and Jaishankar (2011, cited in Tiganoaia, 2013), cybercrime is defined as “an offence that is committed against individuals or groups of individuals with a criminal motive to intentionally cause physical or mental damages, using modern telecommunication networks such as the internet and mobile devices”. Since the late seventies, cybercrime has been apparent, and it has progressively evolved into a more invasive crime. There is no doubt that global cybercrime has become a significant issue.…

    • 1246 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Importance Of Spyware

    • 960 Words
    • 4 Pages

    Spyware is computer software that collects personal information about a user or a company without their consent or knowledge. It monitors the user’s cyberspace activity and records keystrokes as they type. It communicates recorded activities such as your social security, files, usernames, passwords and account numbers. The spyware transmits that information to another computer, usually for advertising purposes. The transmittance of this information can lead to identity theft.…

    • 960 Words
    • 4 Pages
    Improved Essays