10 Oct 2022

84

Federal Laws Relating to Cybersecurity

Format: APA

Academic level: Master’s

Paper type: Essay (Any Type)

Words: 596

Pages: 2

Downloads: 0

Cybersecurity has been a great concern for federal agencies for over one decade now. Due to the increased frequency of attacks as well as their sophistication, keeping up with cyber-attacks has been a great challenge to the federal agencies. For federal agencies to fulfill their responsibility of protecting cyberspace, several revisions on the current law have been proposed to increase information security in the cyberspace ( Fischer, 2013 ). The proposed legislation focuses on areas such as protecting privately held critical infrastructure, cybersecurity information sharing among private and government entities, protection of federal systems, reforming of the Federal Information Security Management Act (FISMA), cybersecurity workforce, research, and development. 

Regarding protection of privately held critical infrastructure, the proposal requires the secretary of Homeland Security to perform risk assessment on each sector and use assessment results to prioritize designation of private sector CI entities, determine necessary security requirements for protecting them, determine any necessary additional regulations for protection, develop the necessary additional regulations in consultation with entities involved, and enforce the developed regulations ( Office of Management and Budget , 2014 ). The proposed regulations also require CI owners and operators to annually certify their compliance, a failure to do so will attract civil penalties. The compliance is based on self or third-party assessments. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Effective protection of information systems has been hindered by several barriers to sharing information regarding possible threats, vulnerability to attack, and other key issues in cybersecurity. Proposal to the law has been made in order to reduce such barriers ( Office of Management and Budget , 2014 ). Such proposals include creating entities for information sharing, establishing provisions for sharing classified information, establishing authority for information sharing between federal agencies and private-sector entity, limiting disclosure of shared information limiting information usage by the government for specified purposes, limiting information sharing liability, and providing liberties protection. 

Proposals were also made on Department of Homeland Security (DHS) authorities for the protection of federal systems ( Fischer, 2013 ). It was proposed that DHS’ current role in cybersecurity be formalized. Furthermore, some proposals were made regarding reforming of FISM such as continuous requirements of genic-wide formation security as well as requirements for continuous monitoring of agency systems. Other proposed topics revision of current cybercrime law, requirements for data breach notifications, the establishment of bills authorizing defense-related cybersecurity. 

Safeguarding information sharing in the cyberspace can be achieved by implementing most of the proposed revisions. Sharing of vital information related to the vulnerability of attack, type of attack, and threats are the main tool for ensuring cyberspace security. Therefore, the vital proposal that should be prioritized is eliminating barriers to information sharing. Once the barriers to information sharing are eliminated, there will be the effective, timely and cost-effective way in which vital cybersecurity information is shared across all sectors including the private sector ( Fischer, 2013 ). This will give the federal agencies easy task in ensuring security across all sectors. Developing cybersecurity regulations as well as introducing penalties for noncompliance is also vital in fighting cybercrime. Relevant and strict regulations and requirements should be put in place so that all sectors are involved in practices that do not make them vulnerable to cybercrime. Furthermore, a reform to FISMA is also essential. 

The current FISMA contain a lot of paperwork and intensive accreditation requirements making it difficult for most sectors to comply with. Currently, only federal agencies and private contractors related to federal agencies comply with FISMA. Under FISMA requirements, information sharing is not allowed to happen with noncompliance agencies ( Office of Management and Budget , 2014 ). This has caused an obstacle to information sharing between federal agencies and most private agencies. Reforming FISMA in a manner which it transforms from too much paperwork framework such that it focuses mainly on continuous security monitory will improve cybersecurity as well as improving compliance. 

References

Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. §§ 3541-3549.

Fischer, E. A. (2013).Federal Laws Relating to Cybersecurity: Overview and Discussion of Proposed Revisions . Washington, D.C.: Congressional Research Service. 7-5700; R42114. (Focus on FISMA provisions.) https://fas.org/sgp/crs/natsec/R42114.pdf 

Office of Management and Budget (2014). Annual Report to Congress: Federal Information Security Management Act (FISMA) 2014. Washington, D.C. https://obamawhitehouse.archives.gov/sites/default/files/omb/assets/egov_docs/fy_2013_fisma_report_05.01.2014.pdf 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Federal Laws Relating to Cybersecurity.
https://studybounty.com/federal-laws-relating-to-cybersecurity-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 442

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 118

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration