CISA Cost-Benefit Analysis

Improved Essays
The CISA is the Computer/Cybersecurity Information Sharing Act that would give government agencies the right to share cybersecurity threats with the public. The CISA bill requires the Director of National Intelligence and the Departments of Homeland Security (DHS), Defense, and Justice to develop procedures to share cybersecurity threat information with private entities, nonfederal government agencies, state, tribal, and local governments, the public, and entities under threats to detect, prevent, or mitigate cybersecurity threats or security vulnerabilities. Private entities may monitor and operate defensive measures on: (1) their own information systems; and (2) with written consent, the information systems of other private or government …show more content…
David S. Levine, a professor at Elon University School of Law comments, “If you are doing a basic cost-benefit-analysis, there are gigantic costs and risks associated with this bill, with little or no upside on the very real issue of how to assess cyber espionage and cybersecurity issues,”. “I am not questioning the motivations. I am questioning whether there are any benefits worth all of these risks.” Overall, the intent of the bill is with good intention of having a centralized hub that detects cybersecurity threats as quickly as possible and prevent the spread of the threat by warning other organizations. However, with the bill, it comes with personal and privacy liability. Though the bill comes with some benefits, there are a lot of risk that comes with. I believe the end results does not really tackle the main issue of security and privacy. And by passing the bill, it does not solve much but open the door for privacy liability and that the risk overweigh the benefits.
Ethical Hacking of Commercially Provided Source
…show more content…
I think there should be the need for white hat hackers to help organization straighten their security systems and mitigate the potential threat of black and grey hat hackers. The white hat hackers will make it much more difficult for a black hat hacker to hack organizations’ computer systems. Without white hat hackers to test, break and penetrate the system, it will be much harder for organization to identify system vulnerability and therefore will prone to the threat of being hacked. Organization should look into hiring white hat hackers and should perform detailed background checks to ensure a well trusted individual is

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are some very specific goals outlined in the policy. The first goal of EO 13636 is “enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties” (EO No. 13636). The second goal of the policy is to increase the information sharing between the United States government and the private industry. The U.S government wants to “increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats” (EO No.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fisa Pros And Cons

    • 531 Words
    • 3 Pages

    Several benefits of FISA have over years been witnessed. Since its enactment, FISA has been an important tool in the fight against intelligence collection by foreign powers or its agents with an aim of exploiting the underlying US government policies or even to establish its future strategies illegally. The USA Patriot Act has seen FISA expand its strategies in exposition of foreign terrorist groups and combating them in good time. This has seen the US government win the war against terrorism and extremism. The Act has also see reduction of purported threats and acts of terrorism to national security.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    By passing this law the U.S government, particularly Bush administration,…

    • 1072 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Superior Essays

    This bill was supported by the Americans Civil Liberties Union and the NRA. It was cosponsored by the out spoken Senator from Texas, Ted Cruz, A Republican and a Senator Dick Durbin an Illinois Democrat. This bill would force the NSA to stop collecting phone records. Representatives James Sensenbrenner a Republican for Wisconsin has sponsored a version of the USA Freedom Act that had the support of the Obama administration. Both bills would stop the NSA form collecting private data.…

    • 765 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    All these citizen have to now worry about possible cybercriminals getting a hold of their personal information and compromising their lives. To make matters worse, this is not only compromising individuals around the country, but it’s also costing tax payers an outrageous amount of tax dollars to fix these issues. If this was done correctly from the start, citizens would not be in a compromising situation, not tax payers would be concerned about how their tax dollars are being…

    • 936 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Many people who find these issues to be of little importance think well I have nothing to hide so they feel comfortable with the idea that their entire digital footprint is accessible by the government. I reject this position. Firstly, because it is a ridiculous stance. Not only does the NSA collect metadata, but it also collects content data like photos, voice communication, videos, text, email, and chat conversations. No sane person would be willing to make all of the contents of their personal communications completely open to the public.…

    • 530 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    FBI Role In The US

    • 1788 Words
    • 8 Pages

    The Information Assurance mission confronts the challenge of preventing foreign enemies from gaining access to sensitive: national security information. The Signals Intelligence mission collects, processes, and disseminates intelligence information for intelligence and counterintelligence purposes and to support military operations. The overall mission of the NSA and the CSS “leads the U.S. Government in cryptology that encompasses both Signals Intelligence and Information Assurance products and services, and enables Computer Network Operations in order to gain a decision…

    • 1788 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Brilliant Essays

    Intelligence In The Intelligence Community

    • 2133 Words
    • 9 Pages
    • 4 Works Cited

    policymakers; Defense Intelligence Agency (DIA) a principal member of the IC who’s, mission is to provide timely, objective all-source military intelligence to policymakers to U.S. Armed Forces around the world; Federal Bureau of Investigation (FBI) a threat-based, intelligence driven national security organization that protects the U.S. from critical threats while safeguarding civil liberties. As both a component of the Department of Justice and a full member of the U.S. IC, the FBI serves as a vital link between intelligence and law enforcement communities; National Geospatial-Intelligence Agency (NGA) is a Department of Defense combat support agency and a member of the national IC, NGA develops imagery and map-based intelligence solutions for U.S. national defense, homeland security and safety of navigation; National Reconnaissance Office (NRO) is considered the nations eyes and ears in space, the NRO is a joint organization with a workforce that includes personnel assigned primarily from the Air Force, CIA, and the Navy. However, the other uniformed services and other elements of the DoD and the IC are also represented to engage in research and development; National Security Agency (NSA) who’s area of expertise include cryptanalysis, cryptography, mathematics, computer science, and foreign…

    • 2133 Words
    • 9 Pages
    • 4 Works Cited
    Brilliant Essays