The Threats of Cyber Security Essay

Exclusively available on IvyPanda Available only on IvyPanda

Under the PPD-21, the owners of the critical infrastructure will work with the government to hasten the process of strengthening the national critical infrastructure in terms of the much needed security. The debilitating impact of the prevailing cyber hazards will also be addressed by the operators, SLTT, and the government (Lyle, 2013).

We will write a custom essay on your topic a custom Essay on The Threats of Cyber Security
808 writers online

These are different from the action plans given in the attachment. However, both policies note that the international partners will also work with the government to boost the security of the critical cyber infrastructure located within and outside the United States of America.

The federal government shall use three main strategic imperatives to strengthen cyber infrastructure. These imperatives include clarifying and refining the functional relationships that are vital to the federal government in fostering cyber security. This differs with the action plans.

Under the executive Order 13636 section 4, the president noted that the cyber security information sharing is a vital tool that the US government will be using as an action plan to fight against the cyber threats within its borders (US Department of Defense, 2013).

This is an outstanding similarity with the action plans depicted in sections 5.0-5-3 of the attached document. Although guidance and policy coordination are similar in both cases, dispute resolution as suggested by the PPD-21 does not appear under the action plans 5.0-5.3 (The White House, 2013).

Building and extending the cyber domain of the NIEM as well as providing standards for cyber security are supposed to be achieved within 60 days and 120 days respectively according to the attached action plan. On the other hand, the PPD-21 and the Executive Order 13636 do not give specific timelines within which certain directives are to be attained.

Finally, the Executive Order 13636 notes that a consultative process will be adopted in the process of combating the threats posed by cyber security with the assistance of the secretary (National Archives and Records Administration, 2013). This tends to fit with the attached action plans 5.0-5.3. The latter emphasizes the importance of instituting voluntary consensus approaches that can hasten the cyber security intervention process.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

References

Lyle, A. (2013). Pentagon Official Examines Law in Cyberspace Operations. Web.

National Archives and Records Administration (2013).

The White House (2013). Presidential Policy Directive — Critical Infrastructure Security and Resilience. Web.

US Department of Defense (2013). Cyber Effort Under Way to Safeguard Infrastructure, Official Says. Web.

Print
Need an custom research paper on The Threats of Cyber Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, August 18). The Threats of Cyber Security. https://ivypanda.com/essays/the-threats-of-cyber-security/

Work Cited

"The Threats of Cyber Security." IvyPanda, 18 Aug. 2022, ivypanda.com/essays/the-threats-of-cyber-security/.

References

IvyPanda. (2022) 'The Threats of Cyber Security'. 18 August.

References

IvyPanda. 2022. "The Threats of Cyber Security." August 18, 2022. https://ivypanda.com/essays/the-threats-of-cyber-security/.

1. IvyPanda. "The Threats of Cyber Security." August 18, 2022. https://ivypanda.com/essays/the-threats-of-cyber-security/.


Bibliography


IvyPanda. "The Threats of Cyber Security." August 18, 2022. https://ivypanda.com/essays/the-threats-of-cyber-security/.

Powered by CiteTotal, free essay citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1