п»їIndividual Assignment #1 (Week 2)
Keeping the give attention to national secureness concerns, evidently discuss the compelling sociopolitical reasons, inspirations, or quarrels for or perhaps against govt intervention in to private sector Cybersecurity. Clearly discuss the methods of government involvement. That is, what authorities (such as laws and regulations, regulations and rules) supply the executive or perhaps legislative associates the right to regulate private market? Describe actual examples that help support your dialogue.
exploration of reasons and methods of government intervention, additionally how the two federal and a few state surgery may be related or vary in factors and methods,
Obviously discuss results on nationwide security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the lowest requirements, and (c) exceeding the minimal requirements. Obviously discuss if private market now has a responsibility to guard national protection through implementing good cybersecurity controls imposed by government regulation. Describe real-world examples that help support your discussion.
Affects and results is comprehensive, including just how federal and some point out regulations may possibly create unintentional positive or negative effects pertaining to national reliability or to get economic progress.
National Cybersecurity and Critical Infrastructure Protection Act of 2013, H. R. 3696. http://www.ndia.org/Advocacy/LegislativeandFederalIssuesUpdate/Documents/CybersecurityBillLetterofSupport1.9.14.pdf 1) Reason for government intervention
2) Ways of government involvement
1 . Details sharing
a. To increase personal sector sharing (why the government need companies to share) i. Fear of disclosure (reason why companies chose never to share)
ii. Mitigating weaknesses for companies in general (reason why they must share) iii. Develop better security for other firms based upon identified removes....
References: Himma, K. At the. (2006). Legal, social, and ethical concerns of the Internet. In M. Hussein, Handbook of Information
Jaeger, C. (2006). Cyberterrorism and information protection. In N. Hussein, Guide of Information Security (Vol.
Waleski, B. D. (2006). The Legal Significance of Information Security: Regulatory Compliance and Liability. In B.