StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Policy Analysis - Essay Example

Cite this document
Summary
In terms of authority and responsibilities, the Secretary of Homeland Security, the Partnership Advisory Council for critical infrastructure, the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Security Policy Analysis
Read Text Preview

Extract of sample "Security Policy Analysis"

Security Policy Analysis al Affiliation) The proposed Cybersecurity Legislation of s and describes responsibility, authority and accountability of various parties. In terms of authority and responsibilities, the Secretary of Homeland Security, the Partnership Advisory Council for critical infrastructure, the private sector and other federal agencies, are empowered to conduct high level cyber security risk assessment on a sector by sector sequence, develop procedures for certain critical infrastructure, identify performance issues and implement plans for restoration.

The authority conferred on these institutions is for defending and monitoring cyber security, while also allowing transparency and accountability. Greater emphasis is also placed on personal accountability and responsibility of cyber security.Section 111(a) stipulates the supremacy of the Act in accordance with other laws relating to cyber security. According to my personal view, this section mimics the supremacy of the Constitution. It distinctly states how the Act, shall supersede very provision, statute, regulation, state rule, that expressly commands comparable cybersecurity practices developed for the purpose of protecting critical infrastructure.

The policy is important in dealing with information security program management. It stipulates the structure for various agencies on now to prevent, assess and even manage cyber security risks. Additionally, it provides a network for federal agencies and other stakeholders to communicate and discuss new developments in cyber terrorism. According to Borene, every federal agency has a distinct role in policy enforcement. On a general basis, each party is tasked with being at the forefront of responsible global cyber engagement, enhancing information sharing and facilitating efforts to increase awareness, training and education to the general population (Borene, 2011).

The lack of clear policy enforcements leads to cyber terrorist attacks on government agencies, loss of information and privacy and loss of billions of dollars on an annual basis. One such incident is the cyber-attack on Blue Shield and Anthem Blue Cross in February 2015. Even though no medical information was compromised, the incident breached notification laws at the state level. When technology moves faster than policy, there are many cases of financial loss and exploitation, such as the period before the establishment of the open data policy, an open source project by the U.

S government.Reference ListBorene, A. (2011). The U.S. intelligence community law sourcebook: A compendium of national security related laws and policy documents (2011 ed.). Chicago: American Bar Association.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1684455-security-policy-analysis
(Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1684455-security-policy-analysis.
“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1684455-security-policy-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Policy Analysis

Fundamental Obligation of Homeland Security

policy analysis Introduction America is fighting against enemies with the intent of attacking the American nation whilst destroying people's way of live.... It is the duty and policy of Homeland Security to guide the nation as they commit themselves to achieve a more protected Homeland, which can sustain the people's way of life.... The document provided a good example of how to create public policy (Forest, 2006, p.... The statement has salient points and the powers required in turning policy into law....
4 Pages (1000 words) Essay

Evaluation and Risk Assessment

Threat analysis enables information security experts to determine the most appropriate approaches of securing systems against systems attacks.... The primary focus of threat analysis should be on analyzing the resources of the attackers.... It is crucial for all organizations to analyze threats to help them develop specific security policies, which they can implement together with policy priorities and comprehend implementation needs for securing organizational resources....
2 Pages (500 words) Research Paper

Enhanced Commitments to Women to Ensure Food Security

One of these policies is the policy on “enhanced commitments to women to ensure food security”.... This study will now provide a critique of this policy.... This critique shall evaluate the advantages and the disadvantages of this policy, along with the issues which have been seen with the implementation of this policy.... In October 2002, the WFP set forth the new Gender policy which was meant to consider the recommendations from the review process....
9 Pages (2250 words) Case Study

Stakeholder Analysis for the Democratic-Republican National Convention (DRNC)

The analysis will define the organization through explaining its main missions and vision as well as the areas that it covers… The analysis identifies the main stakeholders that will attend at the National Convention event while defining the concerns and interest they have.... It will go further to evaluate the organization through a SWOT analysis so that the Apart from presenting information on the strategy that the department will employ, it will also come up with recommendations that will assist the department as it seeks to satisfy the needs of its stakeholders....
5 Pages (1250 words) Essay

Writing a policy about Human Resources Security

However, policies on external cloud computing services as a source of human resource security have accelerated via internet based servers since External cloud computing services Policy on external cloud computing services for human resource security policy introduction Cloud computing entails loading computer data, on multiple servers, that are used regularly can be retrieved via the Internet.... Cloud Computing: Overview and Risk analysis.... analysis of computer system vulnerability....
1 Pages (250 words) Assignment

Does the US Border Control Reflect Best Practice from an International Perspective

The United States border control policy is one of the policies that has affected the operation at the border and has been a challenge to both the citizens and immigrants.... The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists… The border control policy has been tightened after the 9/11 attack that led to hundreds of American citizens losing their lives.... The paper is a discussion on the impact of border control policy towards the citizens as well as its opportunities and challenges....
5 Pages (1250 words) Essay

Policy Briefing

The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists themselves from entering the county as well as identifying the people who are likely to enter the county without permission or in an illegal manner.... The border control… The policy has therefore been affected to prevent entrance of weapon of mass destruction into the county (Wang, 2009). While the border control policy has changed Its main mission has remained unchanged; to prevent and detect illegal entry of people into the United States of America....
5 Pages (1250 words) Essay

Importance of Information Security Policy

This coursework "Importance of Information security policy" focuses on Information security policy that ensures the credibility of information by safeguarding it from unauthorized infiltration.... The importance of information security policy is essential to all business models.... nbsp;… Information security policy is a compilation of guidelines, procedures and processes, which ensure the safety of information in a business or an organization....
9 Pages (2250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us