Under the PPD-21, the owners of the critical infrastructure will work with the government to hasten the process of strengthening the national critical infrastructure in terms of the much needed security. The debilitating impact of the prevailing cyber hazards will also be addressed by the operators, SLTT, and the government (Lyle, 2013).
We will write a custom Essay on The Threats of Cyber Security specifically for you
301 certified writers online
These are different from the action plans given in the attachment. However, both policies note that the international partners will also work with the government to boost the security of the critical cyber infrastructure located within and outside the United States of America.
The federal government shall use three main strategic imperatives to strengthen cyber infrastructure. These imperatives include clarifying and refining the functional relationships that are vital to the federal government in fostering cyber security. This differs with the action plans.
Under the executive Order 13636 section 4, the president noted that the cyber security information sharing is a vital tool that the US government will be using as an action plan to fight against the cyber threats within its borders (US Department of Defense, 2013).
This is an outstanding similarity with the action plans depicted in sections 5.0-5-3 of the attached document. Although guidance and policy coordination are similar in both cases, dispute resolution as suggested by the PPD-21 does not appear under the action plans 5.0-5.3 (The White House, 2013).
Building and extending the cyber domain of the NIEM as well as providing standards for cyber security are supposed to be achieved within 60 days and 120 days respectively according to the attached action plan. On the other hand, the PPD-21 and the Executive Order 13636 do not give specific timelines within which certain directives are to be attained.
Finally, the Executive Order 13636 notes that a consultative process will be adopted in the process of combating the threats posed by cyber security with the assistance of the secretary (National Archives and Records Administration, 2013). This tends to fit with the attached action plans 5.0-5.3. The latter emphasizes the importance of instituting voluntary consensus approaches that can hasten the cyber security intervention process.
Lyle, A. (2013). Pentagon Official Examines Law in Cyberspace Operations. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=119746
National Archives and Records Administration (2013). Executive Order 13636— Improving Critical Infrastructure Cybersecurity. Retrieved from http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf
The White House (2013). Presidential Policy Directive — Critical Infrastructure Security and Resilience. Retrieved from http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy- directive-critical-infrastructure-security-and-resil
US Department of Defense (2013). Cyber Effort Under Way to Safeguard Infrastructure, Official Says. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=119405