The Threats of Cyber Security

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Under the PPD-21, the owners of the critical infrastructure will work with the government to hasten the process of strengthening the national critical infrastructure in terms of the much needed security. The debilitating impact of the prevailing cyber hazards will also be addressed by the operators, SLTT, and the government (Lyle, 2013).

These are different from the action plans given in the attachment. However, both policies note that the international partners will also work with the government to boost the security of the critical cyber infrastructure located within and outside the United States of America.

The federal government shall use three main strategic imperatives to strengthen cyber infrastructure. These imperatives include clarifying and refining the functional relationships that are vital to the federal government in fostering cyber security. This differs with the action plans.

Under the executive Order 13636 section 4, the president noted that the cyber security information sharing is a vital tool that the US government will be using as an action plan to fight against the cyber threats within its borders (US Department of Defense, 2013).

This is an outstanding similarity with the action plans depicted in sections 5.0-5-3 of the attached document. Although guidance and policy coordination are similar in both cases, dispute resolution as suggested by the PPD-21 does not appear under the action plans 5.0-5.3 (The White House, 2013).

Building and extending the cyber domain of the NIEM as well as providing standards for cyber security are supposed to be achieved within 60 days and 120 days respectively according to the attached action plan. On the other hand, the PPD-21 and the Executive Order 13636 do not give specific timelines within which certain directives are to be attained.

Finally, the Executive Order 13636 notes that a consultative process will be adopted in the process of combating the threats posed by cyber security with the assistance of the secretary (National Archives and Records Administration, 2013). This tends to fit with the attached action plans 5.0-5.3. The latter emphasizes the importance of instituting voluntary consensus approaches that can hasten the cyber security intervention process.

References

Lyle, A. (2013). Pentagon Official Examines Law in Cyberspace Operations. Web.

National Archives and Records Administration (2013).

The White House (2013). Presidential Policy Directive — Critical Infrastructure Security and Resilience. Web.

US Department of Defense (2013). Cyber Effort Under Way to Safeguard Infrastructure, Official Says. Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!