The Threats of Cyber Security Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Under the PPD-21, the owners of the critical infrastructure will work with the government to hasten the process of strengthening the national critical infrastructure in terms of the much needed security. The debilitating impact of the prevailing cyber hazards will also be addressed by the operators, SLTT, and the government (Lyle, 2013).

These are different from the action plans given in the attachment. However, both policies note that the international partners will also work with the government to boost the security of the critical cyber infrastructure located within and outside the United States of America.

The federal government shall use three main strategic imperatives to strengthen cyber infrastructure. These imperatives include clarifying and refining the functional relationships that are vital to the federal government in fostering cyber security. This differs with the action plans.

Under the executive Order 13636 section 4, the president noted that the cyber security information sharing is a vital tool that the US government will be using as an action plan to fight against the cyber threats within its borders (US Department of Defense, 2013).

This is an outstanding similarity with the action plans depicted in sections 5.0-5-3 of the attached document. Although guidance and policy coordination are similar in both cases, dispute resolution as suggested by the PPD-21 does not appear under the action plans 5.0-5.3 (The White House, 2013).

Building and extending the cyber domain of the NIEM as well as providing standards for cyber security are supposed to be achieved within 60 days and 120 days respectively according to the attached action plan. On the other hand, the PPD-21 and the Executive Order 13636 do not give specific timelines within which certain directives are to be attained.

Finally, the Executive Order 13636 notes that a consultative process will be adopted in the process of combating the threats posed by cyber security with the assistance of the secretary (National Archives and Records Administration, 2013). This tends to fit with the attached action plans 5.0-5.3. The latter emphasizes the importance of instituting voluntary consensus approaches that can hasten the cyber security intervention process.

References

Lyle, A. (2013). Pentagon Official Examines Law in Cyberspace Operations. Web.

National Archives and Records Administration (2013).

The White House (2013). Presidential Policy Directive — Critical Infrastructure Security and Resilience. Web.

US Department of Defense (2013). Cyber Effort Under Way to Safeguard Infrastructure, Official Says. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, March 13). The Threats of Cyber Security. https://ivypanda.com/essays/the-threats-of-cyber-security/

Work Cited

"The Threats of Cyber Security." IvyPanda, 13 Mar. 2020, ivypanda.com/essays/the-threats-of-cyber-security/.

References

IvyPanda. (2020) 'The Threats of Cyber Security'. 13 March.

References

IvyPanda. 2020. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.

1. IvyPanda. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.


Bibliography


IvyPanda. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
1 / 1