Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Need an argumentative essay on Developing Cybersecurity Law and Policy. Needs to be 3 pages. Please no plagiarism.Download file to see previous pages... Other sections of the Register include the pres

Need an argumentative essay on Developing Cybersecurity Law and Policy. Needs to be 3 pages. Please no plagiarism.

Download file to see previous pages...

Other sections of the Register include the presidential document, reader aid and federal register xml files. These sections guide the users who are mainly federal agencies on new regulations and prerequisite information to participate in rulemaking (GPO, 2013). The Federal Register is used by the relevant agencies to call for public participation in policy creation (Mead, 2004), as the majority of civil users bring in ideas that may not be available within federal workforce. Citizens are also in a position to keep track of current updates on cyber security laws and regulations. Daily updates ensure continuous information gathering and dissemination since cyber technology is highly dynamic (Cate, 2009). Topic 2: US Cyber Command US Cyber Command is a sub-unit in the US strategic command that was created by the Office of the Secretary of Defense in 2010. It is charged with planning, integrating, coordinating, synchronizing and directing military cyber space operations and managing federal information networks. This was an essential step in reinforcing the Department of Defense’s capability to remain in control of its information network reducing vulnerability to cyber warfare (Kenneally, 2001). This is especially the case since intelligence information handled in the network should remain protected for national security (Kenneally, 2001). ...

The president appoints a cyber security coordinator commonly referred to as the cyber czar who is a government employee. It is necessary that this position be held by the government to control biased service by private institutions that may manipulate the information systems, hence making it more vulnerable to hackers (Kenneally, 2001). Academia may have its practice based on theoretical information, thus less flexible to the dynamics involved in cyber operations. This handicaps its efficiency in service delivery. An individual who is open-minded is the most appropriate to hold this position since they have a realistic approach to cyber security management (Kenneally, 2001). Topic 3: Renewed Interest in Public-Private Partnerships Several frameworks have been put in place to improve cyber security in both the public and private sectors. Public-private partnership is essential for effective protection of U.S assets, infrastructure and economic interest from attack on cyber activities. This kind of partnership enhances information sharing, minimizing the risks of the use of cyber facilities especially in the era of increased global connectivity. Partnership enables pooling of resources required for effective workforce education and training and investment in cyber security (Guttmann et al., 2003). Both the public and private sectors should be actively involved in policy making and setting cyber law that remains ahead of possible risks and in pace with technological developments.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question