The Role of U.S. Government in Cybersecurity Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Cybersecurity refers to the application of technological processes with the aim of protecting networks and computers from attacks by unauthorized users (Kostopoulos 35). Effective eradication of cybersecurity requires application of information systems that enhance information security, disaster recovery of important data, network security, and education of end users. According to the government of the United States, cybersecurity is among the most serious economic and security challenges that the government needs to deal with.

Cyber crimes are widespread because of poor preparation and inefficient cybersecurity strategies. In order to protect and secure information and communications infrastructure, it is imperative to enhance cybersecurity. This requires the establishment of legislation to fight cyber crimes. Eradicating cyber crime is an important aspect of developing all the economic sectors because technology has been integrated into industries that are vital to the wellbeing of the economy (Kostopoulos 35). For instance, in order for businesses to improve their bottom line, they should fight cyber crime. The Department of Homeland Security (DHS) has done a lot towards improving cybersecurity and securing computer networks.

Provisions of a U.S. government cybersecurity law

One of the most important roles played by the U.S. government is the enhancement of cybersecurity through enactment of cybersecurity laws. Past efforts by lawmakers to pass cybersecurity bills has proved futile owing to resistance from civil rights groups and online privacy advocates (Theohary par. 2). Cybersecurity laws should have two main goals. First, to protect the national infrastructure and second, to enhance information sharing between the government and state departments, the government and various industries, and among internet users.

Such a law should include provisions that protect companies from any form of liability resulting from dissemination of protected information, and enhance sharing of information regarding potential cyber threats among businesses (Theohary par. 2). In addition, the law should contain provisions that facilitate the dissemination of any information that could enhance cybersecurity even though it is described as classified by security agencies.

A cybersecurity law should include provisions that authorize security departments to share threat reports with businesses and authorize all businesses to develop and implement cybersecurity enhancement programs (Amoroso 52). The law should also authorize security agencies to develop cyber-risk reduction frameworks that should be applied by all businesses based on the guidelines offered by the involved security agencies. In order to enhance the security of national infrastructure, the cyber security law should contain provisions that promote cooperation between federal and state governments, as well as private businesses and public departments. It is also important for such a law to include provisions to protect companies from liabilities whenever they give information to government agencies (Kostopoulos 43).

Privacy laws prevent the access and dissemination of certain information. Therefore, the cybersecurity law should include provisions to facilitate dissemination of information that is protected under privacy laws. One of the reasons that civil rights groups oppose enactment of a cybersecurity law is the financial costs and unfair regulation that the law will impose on businesses (Mazmanian par. 4). In order to eradicate such opposition, provisions to facilitate business funding by the federal government should be included (Amoroso 54).

The government should set aside a certain amount of money in its cybersecurity funding program in order to cover the expenses that could result from enactment of the cybersecurity law. Finally, a provision to enhance consumer privacy should be part of the law. Civil rights groups such as the Center for Democracy and Technology (CDT) and the Electronic Frontier Foundation (EFF) oppose enactment of a cybersecurity law because they claim that it would infringe on the privacy of consumers. In order to end such resistance, the cybersecurity law should include clauses that enhance and guarantee consumer privacy with regard to information sharing between businesses and security agencies (Mazmanian par. 6).

Another important provision to include in a cybersecurity law is a framework to facilitate information sharing between government and businesses. The federal government has numerous departments and agencies that fight cyber crime. Therefore, information about cyber threats should be shared with other industry players. Consumer security is an important factor to consider when passing a cybersecurity law. Many privacy advocates have opposed past efforts to pass cybersecurity legislation because of poor privacy provisions. A cybersecurity law should contain provisions that limit the government with regard to the use of information received from businesses (Amoroso 57). For instance, obtaining data from telecommunication companies without the consent of users has been criticized for violating consumer privacy laws. This has derailed efforts by security agencies to protect private entities from cyber attacks.

The role of U.S. government in cybersecurity

The government is responsible for fighting cyber crime. For that reason, it plays several key roles in enhancing cybersecurity. First, the government improves cybersecurity by enhancing counterintelligence capabilities and providing better security services through establishment and funding of security agencies (Andreasson 48). For instance, several government departments exist to fight cyber crime. These include the National Cybersecurity and Communications Integration Center (NCCIC), the United States Computer Emergency Readiness Team (US-CERT), the Industrial Control Systems Computer Emergency Response Team (ICS-CERT), and the Software Assurance Program.

They work together with business owners in order to enhance cybersecurity by fighting cyber crime. Other government departments that fight cyber crime include the Federal Bureau of investigation (FBI), the Federal Trade Commission, the Federal Communications Commission, and the Department of Commerce (Andreasson 58). These departments play different roles. For instance, the Department of Commerce offers guidelines regarding appropriate selection of information technology products. In addition, it organizes workshops and operates a computer security resource center. Second, the government creates awareness regarding network vulnerabilities by cooperating with state governments and private partners.

Individuals are taught how to act swiftly in order to reduce the extent and frequencies of network breaches. The Department of Homeland Security protects the country’s infrastructure against cyber attacks (Andreasson 41). The NCCIC serves as the center from which all cybersecurity matters are coordinated and integrated into the national cybersecurity system (The White house par. 6). The centre works together with state governments, security agencies, the federal government, and international agencies that fight cyber crime. In addition, it creates awareness with regard to vulnerabilities of networks, ways of implementing recovery strategies, ways of reporting incidents, and methods of preventing cyber attacks (The White house par. 6).

ICS- CERT collaborates with private entities in strengthening and coordinating cybersecurity initiatives. The Computer Emergency Readiness Team offers guidelines and strategies to end users regarding the improvement of cybersecurity (Andreasson 56). Third, the government enhances cybersecurity by funding cyber education and research undertakings that study and develop effective ways of fighting cyber crime. This involves creating strategies that aim to discourage malicious activities and operations in cyberspace. In 2010, the government set aside more than $13 billion to improve cybersecurity.

Fourth, the government enacts legislation to counter cyber crime. Fifth, it coordinates the activities of different players whose main goal is to enhance cybersecurity. In 2008, George W. Bush launched the Comprehensive National Cybersecurity Initiative (CNCI) that was aimed at improving cybersecurity (The White house par. 7). In 2009, President Obama ratified the recommendations of a commission constituted to develop strategies and offer recommendations regarding the improvement of cybersecurity. The Cyberspace Policy Review culminated in several recommendations that included the formation of an executive branch whose role was to coordinate all the activities of government agencies and private entities involved in fighting cyber crime.

Conclusion

Cyber crime is one of the challenges facing the U.S. government. In order to eradicate it, the government funds and oversees the activities of several security agencies and departments that improve cybersecurity. For example, the Department of Homeland Security plays the role of protecting the country’s infrastructure against cyber attacks. government departments that enhance cybersecurity include the National Cybersecurity and Communications Integration Center (NCCIC), the United States Computer Emergency Readiness Team (US-CERT), the Industrial Control Systems Computer Emergency Response Team (ICS-CERT), and the Software Assurance Program.

Past efforts to pass cybersecurity legislation have been futile because of opposition from civil rights activities and privacy advocates. They argue that such laws would infringe on the privacy of consumers and internet users. In order to eradicate such opposition, cybersecurity legislation should contain several provisions that protect the privacy of consumers. Other important provisions include provisions that authorize security departments to share threat reports with businesses and authorize all businesses to develop and implement cybersecurity enhancement programs. Effective eradication of cybercrimes will involve cooperation between the government and other stakeholders such as end users, businesses, and private entities. Enhancement of cybersecurity is important because cyber crimes have severe consequences on the nation’s economy.

Works Cited

Amoroso, Edward. Cyber Security. New York: Silicon Press, 2007. Print.

Andreasson, Kim. Cybersecurity: Public Sector Threats and Responses. New York: CRC Press, 2012. Print.

Kostopoulos, George. Cyberspace and Cybersecurity. New York: CRC Press, 2012. Print.

Mazmanian, Adam. Lawmakers: Leaks Slowed Cybersecurity Legislation. 2013. Web.

Theohary, Catherine. Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress. New York: Diane Publishing, 2010. Print.

The White house: The Comprehensive National Cybersecurity Initiative. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 4). The Role of U.S. Government in Cybersecurity. https://ivypanda.com/essays/the-role-of-us-government-in-cybersecurity/

Work Cited

"The Role of U.S. Government in Cybersecurity." IvyPanda, 4 July 2020, ivypanda.com/essays/the-role-of-us-government-in-cybersecurity/.

References

IvyPanda. (2020) 'The Role of U.S. Government in Cybersecurity'. 4 July.

References

IvyPanda. 2020. "The Role of U.S. Government in Cybersecurity." July 4, 2020. https://ivypanda.com/essays/the-role-of-us-government-in-cybersecurity/.

1. IvyPanda. "The Role of U.S. Government in Cybersecurity." July 4, 2020. https://ivypanda.com/essays/the-role-of-us-government-in-cybersecurity/.


Bibliography


IvyPanda. "The Role of U.S. Government in Cybersecurity." July 4, 2020. https://ivypanda.com/essays/the-role-of-us-government-in-cybersecurity/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1