Improving the nation’s cyber security is a top priority for the Federal Government, which has deployed a whole-of-government approach to identifying, attributing, mitigating and responding to cyber threats. Improving Cyber security information-sharing is one of four 2014 Budget initiatives intended to establish or re-emphasize cross- agency cyber security priorities. The current president of the US, Obama has agreed to take the recommendations of the resultant Internet Policy Review, this has been implemented via the picking of an Executive Branch Cyber security Coordinator whose role will be will accessing the President on a regular basis. This branch is also designed to function diligently with all the key players in U.S such as the private sector, state and local governments so as to guarantee a systematized response to impending cyber occasions through reinforcing the public and private corporations to come up with technology resolutions that safeguard U.S. security. A part of the battle against cybercrime was implemented in 2013 in February the White House gave out an Executive Order 13636 that was meant to improve the Critical Structure of Cyber security (EO) and Presidential Policy Directive-21 directed to the Infrastructure Security and Resilience (PPD-21).The United States government opposes a unsafe blend of recognized and unidentified vulnerabilities in cyberspace and resilient and fast growing adversary abilities. Cyber crime has significantly amplified over the last ten years. Information that is sensitive in the internet is regularly stolen from all types of websites, such as of individuals, the government and private sector networks. This largely undermines the reliability of the information that is restricted within these computer systems through the internet. As a result of these priorities, an interagency group, consisting of representatives from Department of Homeland Security (DHS), Department of Defense (DOD), Department of Justice (DOJ), and the National Institute of Standards and Technology (NIST), and led by the Program Manager for Information-Sharing Environment (PM-ISE) and Comprehensive National Cyber security Initiative-5 (CNCI-5) co-chairs, was tasked to submit a consolidated, policy-approved, Action Plan outlining the methodology and key milestones for implementing the Information-Sharing Architecture (ISA) government-wide. Specifically the plan will:
• Establish the ISA as the foundation for cyber security information-sharing requirements across the government.
• Establish an information-sharing foundational system of business rules, standards, policies, and processes that create the opportunity for machine-speed interoperability that connects all agencies in the federal government and lays the foundation for extension to both State and local authorities and the private sector.
• Synchronize currently disparate technology, information, and mission efforts to develop a comprehensive coordinated cyber security information-sharing framework.
• Primarily implement information-sharing among federal agencies, and secondarily implement coordinated information-sharing from the federal government to state and local governments, and eventually, the private sector.
• Ensure the CNCI-5 agencies and the PM-ISE work with NIST to identify and coordinate activities for machine readable interoperable technical standards for automated information-sharing.
Connecting and mutually leveraging the PM-ISE and CNCI-5 programs is a resource efficient means to achieve near-term improvements to protect the nation from cyber-based threats. The goal and envisioned end-state is that relevant pieces of information make their way to those who need it, regardless of where they are in the government, within the constraints of policy and law, and to connect-the-dots” in identifying cyber security threats at machine speed to enhance shared situational awareness. Enhanced shared situational awareness will enable informed decision making and proactive integrated response, applying the right capabilities via the right actor, while leveraging the right authorities. The National Strategy for Information Sharing and Safeguarding (NSISS) has been in the forefront in fighting cybercrime via ensuring that vital information of the U.S government is safeguarded so as to keep the country away from cyber threats. The action plan is aligned with NSISS to implement a strategy that ensures that all the vital information is used and safely protected.
Related Free Law Essays
- Cyber Security Research
- Gun Control Policy
- Domestic Violence In Pregnancy
- Vulnerability of Information Infrastructure and Trends of Cyber Terrorism; How Best to Measure Cyber-attack Trends
- Human Trafficking Research
- Cyber Security Vulnerabilities
- Criminal Justice Research
- How Computer Crimes Changed Law Enforcement and the Judicial System
- Terrorism Analysis
- Hate Crime Research