Executive Order 13636: A Qualitative Analysis

Improved Essays
Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity. President Obama recognizes this growing issue and made initiative to change it. “On February 12, 2013, President Obama signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity.” The Executive Order is designed to increase the level of core capabilities for our critical infrastructure to manage cyber risk” (Foreign Policy p.1). The main goal of Executive Order 13636 is to improve the United States posture on cyber security through information sharing, cybersecurity practices, and privacy.
The primary research methodology will be a quantitative analysis of cyber threats and data breach data. As these figures will should have direct relation with Executive Order 13636 . There will also be a qualitative analysis on how Chief Information Officers and Chief Security Officers feel about how much this
…show more content…
There are some very specific goals outlined in the policy. The first goal of EO 13636 is “enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties” (EO No. 13636). The second goal of the policy is to increase the information sharing between the United States government and the private industry. The U.S government wants to “increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats” (EO No.

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Federal Information Security Management Act also known as FISMA is United States federal law enactment established to ensure government data, operations and resources against regular or man-made dangers are protected. FISMA was created in 2002 Electronic Government Act of 2002 before cybersecurity became such a vast problem. Modifications were made to FISMA law and renamed Federal Information Security Modernization Act of 2014. The cybersecurity market is continuously expanding as the society rely upon the development and utilization of information technology systems. Within recent years, there has been an increase in the number security risks and data breaches.…

    • 240 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    NextEra Energy, Inc. (NYSE: NEE) is a leading clean energy company that is required to be compliant with the NERC CIP cyber security regulations. The Siemens Security Center was purchased for the Port Everglades Energy Center because This product would allow the site improve the cyber security protection for the site and increase the level of automation For the execution of the NERC CIP mandated tasks. We are pleased with the increase in cyber security capability associated With the Siemens Security Center and will continue to work with Siemens to improve the functionality of the Security Center. Base on the results of the work that is currently in progress at Port Everglades we plan to budget for Siemens Security Centers at our other Siemens…

    • 125 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Millions of Americans depend on the Department of Homeland Security to protect their information including addresses, phone numbers, and other online information that is stored on the DHS’s network. Although cyber attacks can happen at any time, the Department of Homeland Security has many agencies to stop these attacks. The National Cybersecurity and Communications Integration Center (NCCIC) is one of the many agencies that works to stop and address cyber attacks. It is a 24/7 cyber awareness management center. It addresses threats and other incidents affecting our cyber infrastructure to the public to warn citizens about keeping their information…

    • 883 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unfortunately, ensuring cyber-security is something that is yet to be archived by the United States. Not only is the safety of American citizens jeopardized by reckless use of a social media, but furthermore classified information that belongs to private agencies or government officials is also being jeopardized by hackers. In “Improving Cybersecurity” Hillary Clinton states, “Countries that restrict free access to information or violate basic rights of Internet users risk walling themselves off from the progress of the next century” (qtd. Flamini 171). This being the case, restricting the public’s use of the Internet wouldn’t be an effective way of ensuring safety, it would instead work as a setback in human rights.…

    • 139 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The National Institute of Standards and Technology (NIST) established in 1972 by the Computer Security Act of 1987 by redesignating the National Bureau of Standards. In 1998 President Bill Clinton issued Presidential Decision Directive 63 which established the United States critical infrastructure program as applicable to computer and information systems. Subsequently, in 2002 the Federal Information Security Management Act (FISMA) replaced the Computer Security Act of 1987 which intended to enhance information security policies in federal offices. In the end, in 2013 President Barrack Obama signed Executive Order 13636 which led NIST publishing the Cybersecurity Framework version 1.0 which is applicable to the US critical infrastructure. Currently,…

    • 1303 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The victims in that attack included several members of Congress .This is not the only case of data breaches in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government. This information can be used by spies. In 2009, Barack Obama stated that “cybersecurity is one of the most serious economic and national security challenges we face as a nation.” Introducing his new Comprehensive National Cybersecurity Initiative (CNCI), he declared that the U.S. digital infrastructure – “the backbone that underpins a prosperous economy and a strong military and an open and efficient government” – will be treated as “a national strategic asset” and that, “protecting this infrastructure…

    • 954 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Unjust Laws

    • 177 Words
    • 1 Pages

    In today's society, its many laws considered unjust laws. As human beings we should be able do what we want and not have to tell anyone else what we are doing or explain why. We as people shouldn’t have to worry about everything that we do. We should be able to enjoy the internet without worrying anything coming back to haunt us. Many laws today are unjust and innocently target privacy as an invasion due to the fact that we are being affected by all laws today.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The Bush administration created the DHS which made an entire branch in the department of defense dedicated to cybersecurity. The Obama administration strengthened the initial groundwork laid out by the previous administration by bringing in the private sector and foreign governments to combat the constant threats. Cyber Information Sharing and Collaboration Program (CISCP) is an initiative created by the government to allow the sharing of attacks and breaches within a vetted group of companies and government agencies. As of July 2015, 125 various private sector companies shared twenty-eight thousand indicators to help combat intrusions.…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Barack Obama told Reuters on March 2nd, "We have made it very clear to them [China] that this is something they are going to have to change if they are to do business with the United States." The bill gives authority too much power to authorities and potentially worsen human rights violations in China. As well as human right violations, President Obama fears business secrets will be at risk. Article 15 of the bill requires telecommunications carriers and internet service providers to preinstall mechanisms that will allow authorities to inspect their networks anytime and access information about encryption systems without consent. This bill will also be able to be used by China to access secrets behind the intellectual property of companies that supply devices, software and services to telecom carriers and internet service providers in China.…

    • 967 Words
    • 4 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays