The US National Cyber-Security Initiative Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

The first initiative of the national cyber-security program is to integrate the functions of the Federal Enterprise into one unit using Trusted Internet Connections. In this regard, all the external access points of the Federal Government are supposed to be consolidated into a single network platform. The main goal of consolidating these functions is to offer a centralized security solution that can be easily managed, monitored and improved at any given time. Consolidation also helps in validating agency adherence, instituting baseline security capabilities and reducing the number of external access points (Patel, Taghavi, Bakhtiyari, & Júnior, 2013).

In the second initiative, the program is keen on establishing a robust intrusion detection system. The entire Federal enterprise is supposed to be covered by the system. When government networks are accessed by unauthorized users, the system is capable of detecting. In addition, the Department of Homeland Security has already deployed signature-based sensors in order to assist in boosting the robustness and effectiveness of the detection system.

The third initiative entails the establishment of prevention systems that can keep intruders away. As already mentioned in the above initiatives, the entire Federal enterprise ought to be covered by preventive systems. Nearly all Federal Executive Organs and Civil Departments have benefitted from this preventive measure (The Comprehensive National Cybersecurity Initiative, 2014). Both specialized government and commercial technologies have been integrated to build the platform.

Incorporating the Federal government functions into a common unit will make it easier for both users and developers to benefit from the system. For example, there will be less intrusion and random attacks when external access points are reduced to the lowest possible number. Besides, fewer external access points facilitate the effective management and lower operational costs. Better still, when agencies that are being supported by the system are managed centrally, it is quite easy to ensure that they adhere to the set security measures and regulations.

Malicious network traffic can be swiftly detected by a strong intrusion detection system. The latter is a major advantage of the system not forgetting that damages can be minimized by programming the system. For local organizational cybersecurity, the system can work as a network security Armory (Whitman & Mattord, 2011). The origin of detected probes and attacks can also be determined by the same system. The detection system is also a complete defense strategy infrastructure that can provide some peace of mind to both local and national agencies when configured properly. If a network attack is in progress, the system can also alert security officers.

A preventive system as already hinted out keeps attackers at bay. Therefore, before any harm can be inflicted on a local organization or Federal agency, it is detected and prevented. In other words, intruders can hardly access a protected platform. Reducing vulnerabilities, protecting and defending branch networks and systems are the main benefits of the third initiative highlighted above.

Even though deploying nationwide centralized management of Federal Enterprise Network throughout the country is not a smooth task, it can still be done. For example, trusted internet connections can be established, managed and run effectively in individual government agencies, and then a number of the said agencies can be grouped together into a single system using a common network enterprise (Koc, Mazzuchi, & Sarkani, 2012). If the approach is repeated uniformly across all the states, the entire nation will be covered in due time.

Additional capital investment is required to implement a nationwide intrusion detection system. Such capital can be used to purchase more gadgets and employ manpower to manage the system. At some point, it would be necessary to undertake regular capacity building and training for the deployed personnel. Moreover, encouraging the private/public sector partnership is crucial in making sure that each sector contributes towards cybersecurity.

When it comes to preventive measures, it should not only target the Federal Enterprise. Private organizations should also be integrated in pursuit of preventive measures. If the strategy is employed from the local to state levels, a large national scale can be attained with ease.

In regards to how each initiative can be applied to a private organization successfully, it is crucial to point out that a single network enterprise in private organizations may be established if firms that belong in the same sector or industry are grouped together.

For instance, service-based organizations may be managed as a single enterprise within a certain geographical location. Alternatively, private organizations that have been set up by a common entrepreneur can install intrusion detection systems and prevention platforms as single systems. While such organizations should be responsible for the security of their own cyberspaces, collaboration among different players is vital (Eastton & Taylor, 2011). In addition, private organizations should undergo a regular forensic audit of their cyberspaces to determine their safety levels.

A number of cyber laws will definitely emerge from above-chosen initiatives. To begin with, privacy stands out as one of the most important cyber laws that may emerge from the first initiative. When a single network is deployed in the management of a Federal Enterprise Network, it is highly likely that the privacy of various federal agencies will be tampered with or lost. Therefore, it would be necessary to protect any data being managed at a central point.

Intrusion detection and prevention systems may also give rise to jurisdiction, freedom of expression and intellectual property laws especially when private organizations are brought into the equation. A case in point is when commercial technology will be required to facilitate the protection of cyberspace of organizations being managed as a single unit.

References

Eastton, C., & Taylor, J. (2011). Computer Crime, Investigation, and the Law Boston, MA: Course Technology, Cengage Learning.

Koc, L., Mazzuchi, T. A., & Sarkani, S. (2012). A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier. Expert Systems with Applications, 39(18), 13492-13500.

Patel, A., Taghavi, M., Bakhtiyari, K., & Júnior, J. C. (2013). An intrusion detection and prevention system in cloud computing: A systematic review. Journal of Network and Computer Applications, 36(1), 25-41.

The Comprehensive National Cybersecurity Initiative. (2014). Web.

Whitman, M. E., & Mattord, H. (2011). Reading & Cases in Information Security: Law & Ethics. Boston, MA: Course Technology, Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, September 27). The US National Cyber-Security Initiative. https://ivypanda.com/essays/the-us-national-cyber-security-initiative/

Work Cited

"The US National Cyber-Security Initiative." IvyPanda, 27 Sept. 2020, ivypanda.com/essays/the-us-national-cyber-security-initiative/.

References

IvyPanda. (2020) 'The US National Cyber-Security Initiative'. 27 September.

References

IvyPanda. 2020. "The US National Cyber-Security Initiative." September 27, 2020. https://ivypanda.com/essays/the-us-national-cyber-security-initiative/.

1. IvyPanda. "The US National Cyber-Security Initiative." September 27, 2020. https://ivypanda.com/essays/the-us-national-cyber-security-initiative/.


Bibliography


IvyPanda. "The US National Cyber-Security Initiative." September 27, 2020. https://ivypanda.com/essays/the-us-national-cyber-security-initiative/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1