Home > Free Essays > Politics & Government > Government > The Threats of Cyber Security
Cite this

The Threats of Cyber Security Essay


Under the PPD-21, the owners of the critical infrastructure will work with the government to hasten the process of strengthening the national critical infrastructure in terms of the much needed security. The debilitating impact of the prevailing cyber hazards will also be addressed by the operators, SLTT, and the government (Lyle, 2013).

These are different from the action plans given in the attachment. However, both policies note that the international partners will also work with the government to boost the security of the critical cyber infrastructure located within and outside the United States of America.

The federal government shall use three main strategic imperatives to strengthen cyber infrastructure. These imperatives include clarifying and refining the functional relationships that are vital to the federal government in fostering cyber security. This differs with the action plans.

Under the executive Order 13636 section 4, the president noted that the cyber security information sharing is a vital tool that the US government will be using as an action plan to fight against the cyber threats within its borders (US Department of Defense, 2013).

This is an outstanding similarity with the action plans depicted in sections 5.0-5-3 of the attached document. Although guidance and policy coordination are similar in both cases, dispute resolution as suggested by the PPD-21 does not appear under the action plans 5.0-5.3 (The White House, 2013).

Building and extending the cyber domain of the NIEM as well as providing standards for cyber security are supposed to be achieved within 60 days and 120 days respectively according to the attached action plan. On the other hand, the PPD-21 and the Executive Order 13636 do not give specific timelines within which certain directives are to be attained.

Finally, the Executive Order 13636 notes that a consultative process will be adopted in the process of combating the threats posed by cyber security with the assistance of the secretary (National Archives and Records Administration, 2013). This tends to fit with the attached action plans 5.0-5.3. The latter emphasizes the importance of instituting voluntary consensus approaches that can hasten the cyber security intervention process.

References

Lyle, A. (2013). Pentagon Official Examines Law in Cyberspace Operations. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=119746

National Archives and Records Administration (2013). Executive Order 13636— Improving Critical Infrastructure Cybersecurity. Retrieved from http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf

The White House (2013). Presidential Policy Directive — Critical Infrastructure Security and Resilience. Retrieved from http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy- directive-critical-infrastructure-security-and-resil

US Department of Defense (2013). Cyber Effort Under Way to Safeguard Infrastructure, Official Says. Retrieved from http://www.defense.gov/news/newsarticle.aspx?id=119405

This essay on The Threats of Cyber Security was written and submitted by your fellow student. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly.

Need a custom Essay sample written from scratch by
professional specifically for you?

Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar
Writer online avatar

301 certified writers online

GET WRITING HELP
Cite This paper

Select a referencing style:

Reference

IvyPanda. (2020, March 13). The Threats of Cyber Security. Retrieved from https://ivypanda.com/essays/the-threats-of-cyber-security/

Work Cited

"The Threats of Cyber Security." IvyPanda, 13 Mar. 2020, ivypanda.com/essays/the-threats-of-cyber-security/.

1. IvyPanda. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.


Bibliography


IvyPanda. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.

References

IvyPanda. 2020. "The Threats of Cyber Security." March 13, 2020. https://ivypanda.com/essays/the-threats-of-cyber-security/.

References

IvyPanda. (2020) 'The Threats of Cyber Security'. 13 March.

Related papers