Analytic Paper on Cyber Security

Document Type:Research Paper

Subject Area:Religion

Document 1

Therefore, this requires an appropriate cyber security to ensure that the computer systems, programs, and user data are protected from attack. The attack of computers may lead to great losses such as damage to computers, loss of money, loss of financial information and other critical business information among others (Sales et al. p. This paper mainly focuses on providing an analysis of two major cyber security legislation pieces of 2012 that aimed at improving cyber security. This is achieved by discussing the following questions: How Would Enacting S. Protection of Information. The bill also provided for improved protection of all critical information for the organizations. According to the bill, all transaction information, financial information and any other confidential information for an organization will be protected from damage and access by unauthorized individuals.

Sign up to view the full document!

Enactment of the bill would also ensure the protection of important information relating to the government, private entities as well as the international partners. This will, therefore, lead to improved cyber security. The trained employees would be provided with certificates to show that they have the required professional skills and competence. As a result, this would ensure improved cyber security in all organizations (Rosenzweig, p. International cooperation. Enactment of the bill would also ensure international cooperation in the implementation of policies and measures to deal with various cyber threats and risks. The United States government would coordinate with others countries in finding solutions to various cyber risks as well as implementing better cyber security methods. Cyber Security Exchanges. Enactment of the law would ensure exchange of information relating to cyber security and cyber risk indicators among the various organization.

Sign up to view the full document!

This will enable the organizations to determine various ways of improving their cyber security. It will also enable the organizations to realize any probable cyber security threats and risks hence taking the appropriate control actions to deal with the risks (Fischer, p. Annual Assessments and Independent Evaluation. Some of the ways may include: Protecting Critical Infrastructure and Information. Enactment of the act would ensure the protection of critical infrastructure and information hence reducing cyber security threats and risks. For example, the National Cyber Security Council would conduct risk assessments in collaboration with relevant Federal agencies, non-governmental organizations, and private institutions. This would help in the determination of any probable cyber security risks that may affect various organizations leading to the occurrence of losses.

Sign up to view the full document!

As a result, this will enable implementation of appropriate cyber security methods and practices desired to protect various critical infrastructure and information. For example, it would set proper plans and program desired to educate the public about cyber security, cyber security threats and various methods of improving cyber security in the organizations. According to the act, an education campaign for the public would be conducted in order to increase public awareness about cyber security and safety. An education campaign would also be conducted for the state, local government and private entities to increase their knowledge about the benefits of protecting information infrastructure, effects of cyber threats as well as the appropriate remedies for cyber risks. Developing Cyber Security Research and Development.

Sign up to view the full document!

Enactment of the S. Cyber Security Assessments and Independent Evaluation. Enactment of the act would provide for an annual assessment of all information systems, programs, and practices. This will help in determining the effectiveness of the security policies and practices in the provision of the desired cyber security. The annual report from the assessment would also help in the implementation of better security measures to deal with various cyber security threats and risks. An independent evaluation of the information security systems, programs and practices would also be conducted to determine its effectiveness in addressing various cyber security risks. The bill does not adequately address the issues of cyber security liability in case of criminal actions emanating from various security threats. According to the bill, any criminal actions resulting from voluntary disclosure of information, providers of cyber security services, cyber security exchange as well as authorized monitoring of cyber security activities will not be maintained in the federal court of law (Rosenzweig, p.

Sign up to view the full document!

Therefore, a person may inconvenience the cyber security and fail to suffer the consequences of his/her actions due to protection by the law. Cybersecurity threats. The bill did not provide proper guidelines and solutions for addressing various types of cyber threats in order to ensure better cyber security in all parts of the United States (Parfomak, p. Information sharing. The bill did not provide proper policies and guidelines to govern sharing of information between the state, private entities and other institutions. Therefore, this may result in cyber threats and unauthorized access to confidential information (Fischer, p. Cyber Threats. The bill does not provide proper measures and practices to address various cyber threats such as hacking and unauthorized access to confidential information.

Sign up to view the full document!

It will also lead to the discovery of better methods and practices of addressing the different cyber threats and security issues. Assessment and Evaluation of Cyber Threats, Information Security Systems, and Programs. The bill will ensure assessment and evaluation of all probable security threats/risks in order to determine their probability of occurrence as well as discover the most dangerous threats to cyber security. This will enable the taking of appropriate actions to address the various cyber threats. The bill will also provide an annual assessment of the information security systems, programs, and practices in order to determine their effectiveness in addressing the issue of cyber security. "Federal laws relating to cyber security: discussion of proposed revisions. " Congressional Research Service, Library of Congress, 2012.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable