27 Jan 2023

73

Building a Coordinated Federal Cyber Strategy

Format: APA

Academic level: Master’s

Paper type: Research Paper

Words: 315

Pages: 1

Downloads: 0

The Department of Homeland Security (DHS) whose primary role is to ensure the safety and security of America developed the National Strategy to Secure Cyberspace (NSSC) and the National Infrastructure Protection Plan (NIPP). The aim was to put up fabric to build a joint strategy across all national government authorities and stakeholders in the private sector to dilute the threats on America’s cyberspace infrastructure. The NSSC's mandate is to preclude cyber-attacks against the America’s climacteric base and address any vulnerability in their cyber systems. To do so effectively, the NSSC has put in place the National Cyberspace Security Threat and Vulnerability Reduction Program, the National Cyberspace Security Awareness and Training Program and Securing Government’s Cyberspace Program (Kramer, Starr & Wentz, 2009).

The programs focus on minifying threats and deterring suspicious people by informing them of the penal consequences of cyber-attacks. They facilitate training in cyberspace security to meet the high demand for experts in this field and regularly evaluate the weaknesses of this infrastructure. However, these aims have not been operationalized, and as such, the DHS needs to bring everyone together to formulate a framework of how they can be implemented to ensure the success of the NSSC. Since it’s clear that everyone understands the part they are supposed to play, the DHS needs to implement a cooperative information sharing mechanism that interconnects all these stakeholders. The government should adjudicate any matter that might interfere with this collaborative process, by enacting legislation that guarantees its smooth running, indemnifies it against litigation, and appropriates federal funding for it. The government must also ensure that this process is not carried out in a manner that contravenes the law (Westby, 2004).

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The private sector should facilitate innovation in the development of cyber-attack defense equipment and guide the different government agencies on how to adopt and use them. Continuous improvements should be made on these systems to better their tactical and operational abilities (Collins & Baggett, 2009).

References

Kramer, F. D., Starr, S. H., & Wentz, L. K. (2009). Cyberpower and national security. Washington, D.C: Center for Technology and National Security Policy.

Amoroso, E. G. (2013). Cyber-attacks: protecting national infrastructure. Amsterdam: Elsevier.

Collins, P. A., & Baggett, R. K. (2009). Homeland security and critical infrastructure protection. Westport, CT: Praeger Security International.

Westby, J. R. (2004). International guide to cyber security. Chicago, IL: Section of Science & Technology Law, American Bar Association.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Building a Coordinated Federal Cyber Strategy.
https://studybounty.com/building-a-coordinated-federal-cyber-strategy-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Evaluation of the Salvation Army’s Budgeting and Cumulative Report

The Salvation Army International is a non-profit organization that conducts charity work in operational countries while preaching the gospel of Jesus Christ. The organization has been existent since the late 19th...

Words: 2195

Pages: 7

Views: 456

How Enterprise Resource Planning Can Help Boost Customer Satisfaction

Enterprise resource planning systems have proven over the years that they have the potential of boosting customer satisfaction. Organizations that have integrated these systems into their daily operations recorded...

Words: 678

Pages: 2

Views: 158

The Challenges Facing Human Resource Management

Human resource management refers to a tactical and comprehensible approach towards the management of a firm's assets and the people who ensure the firm achieves its goals. A meaningful version of HRM incorporates...

Words: 265

Pages: 1

Views: 156

Whistleblower Protection Act

Over the years, whistleblowers have revealed numerous instances of wrongdoing, both on a small scale and a large scale. In spite of the protections set up to protect whistleblowers, there are still significant...

Words: 503

Pages: 2

Views: 151

Social Media and Politics: How They Intersect

Social media usage has gained substantial popularity in political campaigns within the past decade It has influenced the trends of campaign events and ultimate election polls by shaping voters' sentiments....

Words: 635

Pages: 2

Views: 358

Corporate Social Responsibility: What It Is and What It Isn't

The use of Corporate Social Responsibility is a management tool that helps most business companies to integrate their operations by considering the social and environmental demands for the society. It also considers...

Words: 571

Pages: 2

Views: 176

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration