Table of Contents

  1. Introduction
  2. Discussion
  3. Recommendations for Improving the Current Administrations Cyber-Security Policy
  4. Introduction
  5. Leading from the Top
  6. Anchor Leadership at the White House
  7. Reviewing of Laws and Policies
  8. Baseline Framework and Framework Incident Response
  9. Building Capacity for a Digital Nation
  10. Evidence of My Discussions
  11. Real-World Examples that Help Support Your Position
  12. Conclusion

Introduction

Cybersecurity incorporates both technologies and processes that are designed to guard networks, computers, and data from accessibility by unauthorized people as well as attacks and vulnerabilities that are delivered through the Internet by the cyber wrongdoers. President Obama has acknowledged cybersecurity as one of the most serious national and economic security challenges that is facing the United States.

He also identified the issue to be an element that the previous administration was unable to counter because they were not adequately prepared. After President Barrack Obama took office he, therefore, ordered a comprehensive review of states efforts to protect the information and infrastructure of communication and improvement of an all-inclusive approach to ensure the security of the Americans digital infrastructure.

Discussion

The new administrations cybersecurity approach differs with the previous approach in that the digital infrastructure - the computers and networks that the people and the government depend on daily-shall be treated as a national strategic asset, an element that was forgone by the previous administration. The new approach would therefore protect this infrastructure and consider it as a national security priority.

The old administration did not guarantee the security, resilience and trustworthiness of the networks. The system could neither detect nor defend the Americas digital infrastructure against attacks. With the new cyber-security administration, the president assures that they would be able to deter, detect, prevent, and defend the United States communication infrastructure and networks against any disruption and damages and that the system would be able to recover quickly from it.

The old cybersecurity, the military and intelligent infrastructure system were frequently hacked by malicious hackers who disrupted significant infrastructure with a single click of a mouse hence resulting to severe sustained blackouts, economic loss, and mass casualties. The new administrations cybersecurity will work coherently with the state, local governments and private sectors in order to ensure that there is an unified and organized response to the attacks by hackers and cyber criminals.

Having in mind of the damages that can be caused a single cyber attack, the president has however strengthened the defense mechanisms before any cyber incident takes place. Information is shared before-hand together with issuing warning and creating a coordinated response (Cilluffo, Cardash & Ledgerwood, 2001).

The new administration does not dictate the security standards for private organizations. The system works together with the industry in order to come up with technological solutions that promote security and prosperity. The recent strategy of cybersecurity is folded into two. First is improving the resilience to the incidents of cyber attacks; and second is reducing threats of the cyber attacks. The new administration has been on the resiliently hardened the nations digital infrastructure in order to create a system that is more resistant to disruption and penetration, unlike the previous administrations cybersecurity.

It will, therefore, improve the nations ability to defend itself against complicated and responsive cyber threats: whether they are caused by accident, malicious activities or even natural disasters. The administration has been working with associates on international standards of acceptable customs in cyberspace hence empowering law enforcement capabilities against digital infrastructure crimes and discouraging potential rivals from taking advantage of any remaining vulnerabilities.

The current framework of cybersecurity shall give a flexible, prioritized, performance-based, cost effective, and repeatable approach that includes security information controls and measures in order to help operators and owners of important infrastructure identity, manage, and assess cyber risk. The framework will also identify areas that require improvement and that which should be addressed via future collaboration with certain sectors and developing organizations (Schmidt, 2010).

The current cybersecurity system is more defined and developed as compared to the previous administrations cybersecurity. The current cybersecurity system has a leap-ahead strategies, technologies and programs. The main goal of the CNCI is to come up with technologies that enhance the cybersecurity by order of magnitude above the current communication systems which can be in use within the next five to ten years. The current initiative that was not available in the previous administrations cybersecurity aims at developing programs and strategies that enhances the component of the R&D portfolio of the government that pursue high-payoff solutions to critical problems of cybersecurity.

Policy Recommendations for Improving the Current Administrations Cyber-Security Policy

Recurring cyber disturbances in the critical infrastructure shows the need for improvement of cyber-security. Cyber threats to vital infrastructure continue to grow and it represents one of the main national security challenges that the United States must meet head-on. The economic and national security of the United States relies on the functionality of the Nations vital infrastructure in the face of cyber threats.

It is the policy of the government of the United States to develop the resilience and security of communication and networks infrastructure and to uphold a cyber environment that encourages innovation, efficiency and prosperity of the economy while promoting security, safety, civil liberties, privacy, and business confidentiality ( Byres & Lowe, 2004).

Cyber-security of the current Barrack Obamas administration has recommended various policies that will lead to its improvement. One of policies which will improve cyber-security is the policy of the government of the United States to increase the timeliness, volume, and quality of information on cyber threats that is shared with the private sectors. It will create a better mode of defense and protection against these threats to the entities. Instructions of this policy shall therefore address the need to protect law and intelligent enforcement sources, operations, methods and investigations.

In order to take full advantage of the utility of information sharing on cyber threats with the private sector, the secretary should expand the use of programs that bring the subject matter experts of private sector into the service of the federal government on a basis that is temporary. The subject matter experts will provide advices that regard the structure, content and the type of information that is important to vital infrastructure operators and owners in mitigating and reducing cyber risks.

Leading from the Top

In order to ensure that cyberspace is sufficiently flexible and trustworthy to support the economic goals and growth of the United States, privacy protections, civil liberties and a continued expansion of democratic institutions, therefore, the state requires making cybersecurity a national priority. Attaining this vital and complex responsibility will only be possible with leadership from the top levels of the government.

Anchor Leadership at the White House

Elevating and anchoring leadership for cybersecurity-related policies at the White House will signal the United States and the whole wide community that are serious about cybersecurity. Government agencies as well as components of decision-making part of the office of the President, needs to synchronize disparate authorities and responsibilities to effectively contribute to cybersecurity.

At the moment, there is no single entity or individual who has been allocated the responsibility to effectively coordinate the government cybersecurity allied activities. The president should however consider assigning a cybersecurity policy official at the White House. In order for this official to be successful, he/she must have clear presidential support, sufficient resources and authority in order to operate efficiently and effectively (United States Executive Office of the President, 2009).

Reviewing of Laws and Policies

The Presidents official who is responsible of cybersecurity should work coherently with other agencies and departments in order to recommend unified guidance for the policy to clarify roles, authorities, and responsibilities for activities that are cybersecurity across the Federal government. As Internet-type networks and traditional telecommunications continue to congregate and other sectors of infrastructure adopting internet as the core means of interconnectivity, policies, and law of cybersecurity should continue to look for an approach that is integrated and that which combines the benefits of diversity and flexibility of services and applications with privacy rights, civil liberties, interests of economic and national security and public safety being protected.

The administration should collaborate with congress in order to ensure adequate policies, laws and resources are readily available in supporting United States missions that are related to cybersecurity. The policy official working with the cybersecurity working with agencies and departments should check with industry in order to understand the impact of policies and laws on operations of business.

Baseline Framework and Framework Incident Response

The government has ordered for development of baseline framework in order to reduce cyber risks to vital infrastructure. The framework of cyber security includes a set of standards, procedures, methodologies and processes that support cyber security policy, technological, and business approaches to address cyber thefts and risks. The framework shall put together voluntary consensus standards and the best industrial practices to best extent possible. The cyber security policy official should also take the role of White House action office in case of cyber incidence, and it should be ready to respond.

Building Capacity for a Digital Nation

Use of computers and internet has transformed the lives of people both at workplace and at home. The infrastructure of the nation is undergoing through digital revolution and network technologies are being used and integrated across all systems with programs such as Next Generation Air Traffic and Smart Grid.

Therefore, the whole public needs to be informed to use the technology safely. In order to achieve this cyber security and the related goals, the nation should promote awareness of cyber security for all citizens, build an education framework that will encourage the understanding of cyber security and hence allowing the United States to expend and retain its engineering, scientific, and leadership in market in IT (United States Congress, 2010)

Evidence of My Discussions

I support my position that the United State is doing everything possible and their power to ensure that the security of the cyber space is maintained at the highest level possible and that effective measures and policies are put in place and being reviewed frequently to ensure the stipulated goals that are related to cyber security are achieved. This argument can be supported from the speech that the President barrack Obama gave regarding the cyber security and he pointed out that he understands the issue to the bottom of it because it has affected him at one time.

It is not a secret that my campaign for Presidency exploited technology and internet in order to change the way we conduct politics. Unfortunately, during that period of elections, the hackers managed to get through our computer systems (Obama, 2009).

Secondly, the president Obama directed Homeland Security Council and National Security Council to conduct a thorough top-to-bottom review of the efforts of the federal government to defend the nations communications and information infrastructure. The president has also demanded that the best mechanisms and means be used to ensure that the networks are secure. Third, the president has continued to invest in research and necessary developments for discovery and innovations in order to meet any forth coming digital challenges.

The current administration is laying broadband lines in every part of America creating a smart electric grid that can deliver energy more effectively and efficiently and pursuing next generation systems of air traffic control which have privacy protections. Finally, by encouraging cyber security awareness national campaign and digital literacy in order to enlightened the society on the importance of cyber security. Moreover, the United State has a bill to amend Act of 2002 of Homeland security and other laws to tighten the resiliency and security of communications infrastructure and cyber security (Cone, Irvine, Thompson, & Nguyen, 2007)

Real-World Examples that Help Support Your Position

The United States Secret Service together with the FBI have worked diligently to bring criminals to justice. The secret service has resolute more than 1,100 cases of cybersecurity and cracked the Payment services of Heartland case that had promised more than 130 million credit cards. The defendant of that case, Albert Gonzalez, was sentenced to twenty years in custody.

The other example is the take down of an organization that was led by a Russian which had penetrated over 300 financial institutions, Royal Bank of Scotland being a victim where the Russians coordinated a withdrawal of almost $10million within a day in ATMs around the world. Another example that support my stand that the new set of cybersecurity policies are effective, is the investigation by the FBI that led to the arrest of Pakistan Citizens who funded the terrorists who attacked Mumbai. The success of the policies and laws that are related to cybersecurity is overwhelming.

Conclusion

Globalization of commercial information and technology of communications in military sector, government institutions and in marketplace providing increased opportunities for those intent on harming the United States of America by penetrating in the communication infrastructure in order to acquire unauthorized access to data, interrupt or alter data of communications. Risks that stem from both domestic and globalised cyber criminals should be managed in a comprehensive and strategic way.

Managing these risks will demand greater awareness of cyber vulnerabilities, threats, and consequences that come along with it. President Barrack Obama has, however, directed a through top to bottom review of the governments efforts in order to defend communication and informations infrastructure (United States National Security Council, 2012).

In order to achieve effective cybersecurity policies and laws, the technological infrastructure should be resilient against any physical damage among many other elements that can facilitate effective risk mitigation strategies. The strategies and recommended policies should include mitigation, prevention, and effective response against threats and any criminal activities.

Related essays

  1. Poverty Should Be Eliminated
  2. The Federal Bureau of Investigation (FBI)
  3. United States Border Control
  4. Cause And Effect Of Overcrowding In US Prisons
Chat with Support