Exploration Of Cyber Security As A Public Good

2319 words - 10 pages

Exploration of Cyber Security as a Public Good

1) How can government justify telling private industry how to set up or improve their cyber security?
“President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter” (U.S. White House Office, 2010). Today, more than ever, society is dependent on cyberspace to accomplish many aspects of our daily lives. We utilize computer networks to ensure America’s economic competitiveness through e-commerce, the stock exchange and numerous other methods. Along with using the network for ...view middle of the document...

According to the National Strategy To Secure Cyberspace, “ Federal actions to secure cyberspace are warranted for purposes including: forensics and attack attribution, protection of network and systems critical to national security, indications and warnings, and protection against organized attacks capable of inflicting debilitating damage to the economy.” (U.S. White House Office, 2003) In these cases the federal government can directly intervene and dictate specific security requirements.
The government indirectly dictates cyber security by instituting certain laws, regulations and standards. Through these, private industry is required to be compliant with the regulations or conform to the set forth standards. The Financial Services Modernization Act of 1999, better known as Gramm-Leach-Bliley (GLB), does no directly dictate how institutions secure the network. However, GLB does focus on the privacy of certain personal information but also specifically address the security of the data. Through the use of GLB the federal government regulates the handling of nonpublic personal information. GLB also lays out several security obligations that organization must provide in order to safeguard data. GLB does not spell out how to secure the data, but obligates agencies to create standards that cover administrative, technical, and physical safeguards. (Bidgoli, 2011). Specifically, GLB requires organizations; “ensure the security and confidentiality of customer records and information. It requires that the protect against any anticipated threats or hazards to the security or integrity of such records; and to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer” (Bidgoli, 2011). In requiring a certain level of protection of data, the government is justified in indirectly telling private industry how to improve their cyber security.
Another similar situation in which the government indirectly instructs private industry on security is the Electronic Communications Privacy Act (ECPA, 1986). Although an older piece of legislation, it still remains relevant today. “ECPA prohibits anyone from intentionally accessing, using, or disclosing stored communications, such as email or stored voice messages, without authorization.” (Bidgoli, 2011, p50) “The ECPA also expressly prohibits providers of “electronic communications” or “remote computing services” from knowingly divulging the content of a communication in electronic storage, except under certain enumerate circumstances (18 U.S.C. 2707c)”(Bidgoli, 2011, p50) The ECPA does not directly focus on the data security. However, organizations must be aware that in order to prevent the compromise or release of this data the security of their network and data must be thorough. Therefore, the government has justified improving private industry security through another regulation.
When President...

Other Essays Like Exploration of Cyber Security as a Public Good

The Charateristics of a Good Boss as Opposed to a Bad Boss

1093 words - 5 pages The Characteristics of a Good Boss as Opposed to a Bad Boss Stacy Giroux COM/155 February 13, 2014 Anne Cox The Characteristics of a Good Boss as Opposed to a Bad Boss In the property preservation field, having the characteristics of a good boss as opposed to a bad boss is very important to the success of the business. Property preservation is a tough field to be in for several reasons. First, the competition is high because, in

Acts Of Parliament As Public Law

2382 words - 10 pages Acts of Parliament as Public Law Acts of parliament are considered to be the highest form of law in England. The reason for this is constitutional. Under England's unwritten constitution, parliament is seen as sovereign. As a result, its enacted will, in the form of Acts of parliament, cannot be challenged in the courts. However, in practice there are legal, political and moral limitations on this sovereignty, which

Expected Return of a Security

2792 words - 12 pages time period (T): RiT=αi+βiRmT+eiT αi= is the intercept, gives excess return when market return is 0. RmT=0, βi= sensitivity measure and measures the systematic part of the risk. eiT= can be the “error” term, with 0 mean and represents the firm specific surprise element. Since αi is a non-market premium, and represents additional return it is good. If a security is under-priced we see a positive αi as it gives a lucrative return on

Ethical Dilemma. should I do this as a good teacher?

1185 words - 5 pages 1 During my four years of being a teacher, one question that I frequently ask myself is "should I do this as a good teacher?" I ask this question not to be regarded as a good teacher by my students or colleagues or superiors; I ask this question because as a teacher, I want to make sure that everything I do is worthy of my students' trust. Most of the times I can get the answer easily because many things we do are easily justifiable as being

A Comparison of Information Security Surveys

3096 words - 13 pages Running Head: A COMPARISON OF INFORMATION SECURITY SURVEYS A Comparison of Information Security Surveys Conducted by the Computer Security Institute and Ernst & Young of Public and Private Sector Organizations University of Maryland University College A Comparison of Information Security Surveys Conducted by the Computer Security Institute and Ernst & Young of Public and Private Sector Organizations Emerging technologies

A Very Good Summary Of Seagul

9973 words - 40 pages play and hates it even before she has seen it. Sorin laughs off this idea. Treplev goes on to describe what he feels are the many faults and few attributes of his mother. He describes Arkadina as jealous, vain, and miserly, but a good nurse, a talented actress, and an intelligent woman. Treplev picks a flower and pulls off its feathers saying, "She loves me, she loves me not," etc. He concludes that Arkadina does not love him.Treplev goes on to

Too Much of a Good Thing

628 words - 3 pages Too Much of a good thing ?      The central theme of the article is that quality can be an obstacle to innovation.   The belief that there is a positive link between quality and innovation is widely shared among quality  professionals. Yet the experience of Japanese manufacturing firms, who are well known for their high  standards of quality performance, casts doubt upon this relationship. In fact, the inability of some  Japanese

Too Much of a Good Thing

1109 words - 5 pages Chinese tourists as the mainland Chinese are outbound. Reference Cros, H. D. (2007). Too Much of a Good Thing? Visitor Congestion Management Issues for Popular World Heritage Tourist Attractions. Journal of Heritage Tourism, 2(3), 225-238. Leung, P. (2010, February 24). Ruins of St. Paul's to give tourists better experience. Poyis Journalism Portfolio. Retrieved September 30, 2014, from http://poyileung.wordpress.com/2010/02/24/ruins-of-st-pauls

Good Style Is A Reflection Of A Writer Making Good Choices

1161 words - 5 pages Good Style is a Reflection of a Writer Making Good Choices When putting pen to paper or typing on a keyboard in order to write something, a writer makes decisions. These decisions will result in what will be the writer’s finished work and will unintentionally reflect what the writer knows about writing style. In just trying to convey his or her ideas, a writer will follow rules of grammar and spelling as well as various advice accumulated

Feeling Good to Be a Part of This

1109 words - 5 pages it feel good to be a part of this community. this site is doing great help in concentrating the thoughts of a person government approval.[2][3][4] In April 2011, civil activist Anna Hazare started a Satyagraha movement by commencing an indefinite fast in New Delhi to demand the passing of the bill. The movement attracted attention in the media, and hundreds of thousands of supporters, in part due to the organizational skills of Arvind

To Kill a Mockingbird: Coexistence of Good and Evil

543 words - 3 pages To Kill a Mockingbird: Coexistence of Good and Evil Evil men are always interfering with a good man’s dream. In “To Kill a Mockingbird”, there were many different signs of good and evil. However, the meanest of them all was Bob Ewell and his daughter, Mayella Ewell: I got somethin’ to say an’ then I ain’t gonna say no more. That nigger yonder took advantage of me an’ if you fine fancy gentlemen don’t wanta do nothin

Related Papers

A Career As A Certified Public Accountant

1328 words - 6 pages Certified Public Accountant Growing up is scary. Especially when the future is unpredictable, finding the right job can reduce this. It is tough as a kid to think about how to spend the time in the future and what to be doing as a career. There are a lot of decisions to be made. For example, in order to pick the accurate college it is worthy to know what interests me as an individual. There are questions that can be answered that will be able

Security As A Service Market By Solution

651 words - 3 pages %, Director level – 25%, Others – 15% • By Region: North America – 10%, Europe – 20%, APAC – 40%, RoW – 30% For complete report please visit :http://www.gosreports.com/security-as-a-service-market-by-solution-email-encryption-siem-iam-endpoint-protection-idsips-data-loss-prevention-and-others-by-service-by-application-by-organization-size-by-vertical-by/ TABLE OF CONTENTS 1 INTRODUCTION 13 1.1 OBJECTIVES OF THE STUDY 13 1.2

Exploration Of A Journal Article In Sociology

919 words - 4 pages Assignment 1: Exploration of a Journal Article in Sociology XXXXXX Sociology XXXXX 5-6-2013   Identify the pros and cons of the partnership as a form of ownership. Owning your own business can be a very rewarding and lucrative experience. This experience even though rewarding can come at a tremendous cost of personal time and personal financial investment. Enlisting the efforts and finances of a partner can aide in successfulness of

How Will The Advancement Of Cyber Security Affect Communication On Social Media?

2183 words - 9 pages , smartphone, and mobile device risk. Theodore and Holman agree that Cyber-attacks on large companies, such as Twitter and Facebook are leapfrogging the defenses that companies are putting in place to defend themselves and we're seeing a heightened level of sophistication in their techniques. This Internet security 4 threat report provides an overview and analysis of the year in global threat activity. Cyber-crime is difficult to solve