M2D2: U.S. Federal Government Organization and Response to Cyber Threats U.S. President Barack Obama meets with former National Security Adviser Tom Donilon (2R) and former IBM CEO Sam Palmisano (2L),

Module 2: Learning & Assessment Activities

During this module you will:

Read:

  • Required

    • Module Notes:  U.S. National Cybersecurity Strategy

    • Chapter 7 One Government’s Approach to Cybersecurity (Links to an external site.) in Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook. Hoboken: Wiley.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsebk&AN=535983&site=eds-live&scope=site

    • Dunn, Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities (Links to an external site.)Science & Engineering Ethics20(3), 701-715. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=97178206&site=eds-live&scope=site

    • Newmeyer, K. P. (2012). Who Should Lead U.S. Cybersecurity Efforts? (Links to an external site.)PRISM Security Studies Journal3(2), 115. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=73151318&site=eds-live&scope=site

    • Trautman, L. J. (2015). CYBERSECURITY: WHAT ABOUT U.S. POLICY? (Links to an external site.)Journal Of Law, Technology & Policy2015(2), 341. Retrieved from https://advance-lexis-com.vlib.excelsior.edu/api/permalink/a1d87fa0-a780-4d5a-b73c-c94375df5431/?context=1516831

    • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War (Links to an external site.)Survival (00396338)53(1), 23-40. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=57658056&scope=site

View:

  • Required

    • Code wars: America's cyber threat (https://vlib.excelsior.edu/login?url=https://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288.) [Video file, 43:19 minutes]. (2011). In Films On Demand. Retrieved April 20, 2016

    • The President Speaks on the Cybersecurity National Action Plan (Links to an external site.) [Video file, 06:50 minutes]. (2016). Retrieved from https://www.youtube.com/watch?v=ZGFMZDQl9z0

  • Review the following webpages:

    • Department of Homeland Security: Cybersecurity (https://www.dhs.gov/topic/cybersecurity)

      • This webpage provides an overview of the Department’s cybersecurity programs.  Use it to familiarize yourself with the terms and offices involved as well as the role played by DHS in cybersecurity.  We will look at this in depth later in the course

    • National Cybersecurity Institute at Excelsior College (Links to an external site.)

      • This is Excelsior College’s effort on cybersecurity.  It contains several blogs and webinars that may be useful as the course progresses.  Consider it an additional source for information.

    • U.S. Government Accountability Office Cybersecurity (Links to an external site.)

      • The GAO performs research at the request of Congress.  It is a non-partisan government agency.  This page contains links to GAO research and publications on cybersecurity issues.  It provides several resources that may be useful in identifying topics for research papers as well as policy questions arising during the course.

Discuss:

M2D2: U.S. Federal Government Organization and Response to Cyber Threats

Module 2

The U.S. response to cybersecurity threats has been criticized as disjointed and lacking leadership.  At present the responsibility is divided between multiple executive departments with different authorities.  Newmeyer (2012) argued for greater budgetary control and a powerful cyberczar.  The GAO report (Wilshusen & Barkakati, 2013) also points to lack of clear responsibilities in the U.S. government regarding cyber threats and responses. Dunn-Cavelty (2014) pointed to the risks of securitization. The public demands something be done but what?

The module learning outcomes addressed in this activity are:

  • Explain the roles and responsibilities of the various U.S. executive branch departments in developing and executing national cybersecurity policy.

  • Describe cyber threats to U.S. national security including critical infrastructure, espionage, economic disruption, and criminal activity.

Question

After completing the assigned readings for the module, please respond to the following question in your initial post:

  • Current U.S. Federal Government policy divides cybersecurity responsibilities among multiple departments including Homeland Security, Defense, and Justice.  Some authors have criticized this as ineffective and cyber threats continue to increase.  Describe how you would organize the government response and include your reasoning for changes or maintenance of the status quo.  Please cite course materials and/or outside scholarly research to support your conclusions.


    • Note: Please contribute one original post in response to each discussion question.  Response should be 2-3 paragraphs minimum 300 words and include citations and references in APA format. 

Use the EC Library resources for research assistance and to properly cite your work:

  • Military Leadership Research Guide (Links to an external site.)

  • National Security Research Guide (Links to an external site.) (Links to an external site.)

  • Plagiarism & Copyright (Links to an external site.)

  • Excelsior Library Writing Help (Links to an external site.)

  • APA Citation Help (Links to an external site.)

  • Excelsior College Online Writing Lab (OWL) (Links to an external site.)