Improving Critical Infrastructure Cybersecurity Framework

Improved Essays
The National Institute of Standards and Technology (NIST) established in 1972 by the Computer Security Act of 1987 by redesignating the National Bureau of Standards. In 1998 President Bill Clinton issued Presidential Decision Directive 63 which established the United States critical infrastructure program as applicable to computer and information systems. Subsequently, in 2002 the Federal Information Security Management Act (FISMA) replaced the Computer Security Act of 1987 which intended to enhance information security policies in federal offices. In the end, in 2013 President Barrack Obama signed Executive Order 13636 which led NIST publishing the Cybersecurity Framework version 1.0 which is applicable to the US critical infrastructure. Currently, …show more content…
For example, NIST SP 800-53 deals with the steps of the Risk Management Framework required by the Federal Information Processing Standards (FIPS) 200 (Chang-Gu, 2017). Additionally, ISO 27000 and COBIT frameworks describe how to execute controls and procedures within the information technology domains. Most organizations and federal offices are bound to a specific policy, NIST CSF on the other hand compliments and builds on existing theoretical accounts to strengthen an organization's cybersecurity …show more content…
NIST with the cooperation of various industry leaders created a standardized framework to improve and reduce cybersecurity risks. This led to NIST publishing version 1.0 of the Cybersecurity Framework on February 12, 2014; which commonly known as “NIST CSF”. While NIST CSF references common standards and practices such as ISO 27001, COBIT, NIST SP 800-53, ISA 62443, and the Council on Cybersecurity Critical Security Controls it was never intended to replace or supersede those standards but rather to compliment or enhance existing practices. As of January 10, 2017, NIST and various industry partners under the direction of the Cybersecurity Enhancement Act of 2014 are in the process of coordinating and developing CSF version 1.1 to address and review gaps or weakness and to facilitate its usage (Cybersecurity Framework Draft Version 1.1,

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    Project Details This scope of work document is targeted to allow the Supplier to provide a quote for a five year services proposal that is focused in the area of support for NERC CIP. The services described below will be quoted for the application to the cyber devices that exist in NextEra Power Plants that are subject to the NERC CIP Version 6 regulations. The Supplier will provide their rates for the execution of the services work described below and will provide a range of qualification levels that would be needed to execute each of the tasks described below as part of the Supplier response to the NextEra RFP. (11 Tasks) TASK 1: PROJECT MANAGEMENT SUPPORT AND ADMINISTRATION…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The documents were created in order to help Director of National Intelligence and policymakers view security or interest of the United States. The Network Intelligence or (NI) is the capacity of a network to examine data packets continuously and in real time. The National Security act of 1947 or (NSA, 1947) was an act that limited the military and intelligence agencies with limitation the agencies could not operate properly. The senate two years later passed another act that change the agency to the Department of Defense an gave the agencies more rights. The Network intelligence is a process that analyze data and finds a correlation in various source of network traffic.…

    • 1597 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Nsc-68

    • 739 Words
    • 3 Pages

    The act also created the Central Intelligence Agency (CIA) to coordinate the intelligence gathering activities of various government agencies. Finally, the act also provided for a National Security Council (NSC) which advises the president on all matters regarding national security. The National Security…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Security Policy

    • 754 Words
    • 4 Pages

    Bush knew something had to be done to protect American citizens. The U.S.A. P.A.T.R.I.O.T. Act was passed on October 26 2001, barely 6 weeks after the attack. The United States was already beginning to strengthen the security system by putting new laws into effect. The acronym stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act. The Patriot Act had 4 major goals.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Developed in collaboration with healthcare and information security professionals, the Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a security framework for protecting health information tailored for the U.S. healthcare industry. The CSF includes and integrates federal and state regulations, standards, and frameworks such as HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), and COBIT (Control Objectives for Information and related Technology) to provide a healthcare organization with a broad and adaptable tool for assessing risk (Murphy, 2015). As described on the Health Information Trust…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    New tools accessible from the Patriot Act Before September 11th, 2001 (9/11) the United States Federal Government had methods of…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    Former President Bush was the one who required federal agencies to develop and implement policies and systems that are set in place to enhance sharing information, by issuing several executive orders. Information sharing is the number one key to how the resources are used to accomplish task. There are many agencies set into place to protect the homeland also, we have community policing that assist in accomplishing the task and working with homeland…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The attacks on September 11, 2001 brought to light the many failures of our law enforcement and central intelligence community. In order to combat these issues the Government quickly enacted a bill to fix some of these issues. This new bill was called the Patriot Act. President George W. Bush signed it into law on October 26, 2001. It gave law enforcement and intelligence agencies many new tools and rules to protect the United States from terrorist attacks.…

    • 1579 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays