Cyber Security: Threats, Response and Improvement Essay

2708 Words Jul 28th, 2013 11 Pages
Cyber Security: Threats, Response and Improvement

INTA 651 National Security Policy
Dr. Kevin P. Reynolds
Texas A&M University

Prepared by:
Jason Jiménez

Cyber Space and its Security
Cyberspace, or the Internet as an interchangeable reference, is the electronic medium of computer networks and systems in which online communication and enterprise takes place. Originally, the Internet served to interconnect laboratories engaged in government research. However, since 1994, the decentralized Internet has expanded to serve millions of users and a multitude of purposes in all parts of the world. With this shift from government tool to general tool, the Internet has become a collective result of ideas, beliefs and initiatives.
…show more content…
The strategy also strives to provide the research community access to event data to facilitate developing tools, testing theories, and identifying workable solutions.7
Cyber security and its safeguarding of critical infrastructure as we know it today came to pass The Homeland Security Act of 2002 (P.L. 107-296), which transferred and integrated several federal entities that play a role in cyber-security of control systems into the Department of Homeland Security. These entities include the Critical Infrastructure Assurance Office, the National Infrastructure Protection Center, the National Infrastructure Simulation and Analysis Center, and parts of the Department of Energy’s Office of Energy Assurance. Additionally, the Homeland Security Act of 2002 created a new class of information, critical infrastructure information, which can be withheld from the public by the federal government.
In spite of the clandestine measures in place to ensure the integrity of privileged information, the cornerstone of America’s cyberspace security strategy is and will remain a public-private partnership. The government, working with key stakeholders, should design an effective mechanism to achieve a true common operating picture that integrates information from the government and the private sector and serves as the basis for informed and prioritized vulnerability mitigation efforts and incident response decisions. From a federal

Related Documents