Air Force and Cyber Security Policies Report

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The widespread rise in the use of modern technology world over has initiated introduction of legislations to curb any threat. For instance, in United States uses cyberspace to travel, power their homes, communicate, provide essential government services, and run their economy. The overreliance on the network has posed serious attacks thus causing more information vulnerability.

In cybercrimes, one does not need to break into a physical property to steal information or use force to access the materials. For example, bank frauds have been on the rise with the coming of this new technology. In addition, cases of information confidentiality is worrying, as other internet savvy people can access such information, a recent example is the wikileaks.

These cases prompted US to pass legislations that could help in eradicating this menace. Since many departments and organizations use this modern technology, fighting the vices is a shared responsibility. The private and public sectors are collaborating to create awareness on cyber security among the internet users.

The US administration released a legislative proposal that could help in ensuring cyber security. Some of the proposals’ components and the immediate effects are outlined herein. The first component is the damage to a critical infrastructure computer.

This component tries to minimize damages that a person can cause to a critical infrastructure computer or that which is associated with the same computer. If a person does this offense, he/she is liable for a term of 3 years imprisonment (Schmidt, 2011). Remarkably, the courts are under obligation not to reduce the number of terms for such crimes.

A critical infrastructure computer is a computer, which provides essential services to the public and government bodies. These services may include communication and transport services, health and clean water supply, and banking services. This proposal can help to eliminate cases of cybercrimes in organizations; for instance, organizations will update their policies concerning cyber security.

In case of such felony, the victim is imprisoned for the terms that the policy outlines. The US Air force wing they will be able to track any intruder who can be accessing the state’s and federal governments’ security details. The proposal eases the Air force’s work (The Presence of Commercial/External Links, n.d.).

The next component is the access to data without authorization. This involves accessing password protected documents without the knowledge of the owners (Schmidt, 2011). The imprisonment proposal put forward a term of not more than twenty years or subjection of a fine under the title.

Notably, these charges are levied if the victim’s access to the information was for personal financial gain, the value of the information exceeded $5, 000, and the act furthered criminal or tortious acts, such as causing physical injuries to any person. Remarkably, in case a person causes death knowingly from the above violations, he/she is subjected to imprisonment for life or any term of years or both.

This proposal also included the changes in both civil and criminal forfeiture. This legislation will also help organizations to operate with ease, as there will be fewer cybercrimes. Various organizations will have to adjust their policies to be in alignment with the US proposals.

The Administration’s proposal requires that businesses notify consumers and customers if there is compromise in their personal information. In this manner, the administration is aiming at protecting consumers and further, it outlines penalties for computer crimes, such as mandatory minimums for critical infrastructure computer intrusions.

The proposal was set to improve critical infrastructure protection by encouraging collaboration between public and private partners. The federal governments had the sole responsibility to provide voluntary assistance to organizations and increase sharing of information with all the stakeholders.

In formalizing of management roles, it helped in protecting the Federal Government networks. In addition, it improved recruitment of cyber security professionals, and ensuring that data are stored at an affordable cost. According to The Presence of Commercial/External Links (n.d.), the Air force operations will improve but their policy to prevent third party access to their information will be compromised if such proposal goes through.

The white house was also proposed to take the first initiative in fighting the felony. Interestingly, the white house was to control all networks; for example, during the World War I in 1918, the congress allowed the President to control all telegraphic systems (White House, 2009).

The sophistication in communication requires that a coordinated mechanism be put in place to avert the threats of cyber insecurities. The proposal required the President to consider appointing a group that could have a centralized point to monitor the criminal attacks.

Therefore, the group will have the Presidential support and even vast resources to implement the mission. Notably, this group is meant to work with the federal governments and other departmental agencies such as the cyber security officials. This move could help organizations to be held accountable to any threat that could go unnoticed. Therefore, organizations will also tighten their cybercrime policies in order to track infiltrators.

Additionally, there was a proposal to educate the entire mass on the changing digital world. This was to be done through The President’s cyber security policy official, as it coordinates with ICI-IPC (White House, 2009). The need for skills is changing at an immense rate in all sectors such as education, employment, infrastructure, and economy.

In the education line, careers that geared towards cyber security were to be given scholarships to enhance data protection. This initiative aims at creating an American Population that is techno savvy in the 21st century.

Moreover, organizations will be able to absorb employees who are knowledgeable and skillful in their areas of specialization. These employees will also help to fight crimes emanating from data damage. For this reason, Employers should encourage employment and retaining of these employees.

Moreover, there was a proposal to encourage research and innovation on game changing technologies. In this, identity management was to be established by the cyber security council (White House, 2009). Notably, intruders and unauthorized membership access to companies, government or individual data is put under control.

The energy department, for instance, rolled out a strategy to monitor their power supply in the states. This strategy was monitored online, thus helping to identify any trespassers. Although this policy is effective in controlling access of information by intruders, the control by the state means the state officials can have access to organizations data. This prohibits the issue of information confidentiality.

Government officials will have to monitor information that is contained in other sites, some of which may be a threat to national security. Lastly, in the business front the use of technology requires higher levels of risk management practices than before. The use of technology in processing financial transactions implies that there is need to boost the trustworthiness, security, resilience, and reliability.

This proposal could help improve the volume of trade if implemented. In addition, it will expand partnerships both locally and internationally. The trading organizations will provide threat information and even identify means of eradicating these threats. The supply chains will be free from attacks, thus boosting trade.

Conclusively, fighting cyber security requires multiple sets of approach; it needs the cooperation of all stakeholders. For example, the legislations put forward require the support of both the government and the public to ensure successful implementation.

References

The Presence of Commercial/External Links. (n.d.). Air Force Reserve Command. Web.

Schmidt, H. A. (2011). | The White House. Web.

White House. (2009). Cyber Space PoIicy Review. Web.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, April 16). Air Force and Cyber Security Policies. https://ivypanda.com/essays/impact-of-legislation-on-the-air-force-reserve-command/

Work Cited

"Air Force and Cyber Security Policies." IvyPanda, 16 Apr. 2019, ivypanda.com/essays/impact-of-legislation-on-the-air-force-reserve-command/.

References

IvyPanda. (2019) 'Air Force and Cyber Security Policies'. 16 April.

References

IvyPanda. 2019. "Air Force and Cyber Security Policies." April 16, 2019. https://ivypanda.com/essays/impact-of-legislation-on-the-air-force-reserve-command/.

1. IvyPanda. "Air Force and Cyber Security Policies." April 16, 2019. https://ivypanda.com/essays/impact-of-legislation-on-the-air-force-reserve-command/.


Bibliography


IvyPanda. "Air Force and Cyber Security Policies." April 16, 2019. https://ivypanda.com/essays/impact-of-legislation-on-the-air-force-reserve-command/.

Powered by CiteTotal, online citation creator
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1