Thursday, June 13, 2019
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words
Security Policy Analysis - Essay ExampleGreater emphasis is also placed on personal accountability and responsibility of cyber security.Section 111(a) stipulates the supremacy of the Act in accordance with other laws relating to cyber security. According to my personal view, this section mimics the supremacy of the Constitution. It distinctly states how the Act, shall supplant very provision, statute, regulation, state rule, that expressly commands comparable cybersecurity practices developed for the purpose of protecting critical infrastructure.The form _or_ system of government is important in dealing with information security computer programme management. It stipulates the structure for various agencies on now to prevent, assess and even manage cyber security risks. Additionally, it provides a network for federal agencies and other stakeholders to communicate and discuss bare-assed developments in cyber terrorism.According to Borene, every federal agency has a distinct role i n policy enforcement. On a general basis, each fellowship is tasked with being at the forefront of responsible global cyber engagement, enhancing information sharing and facilitating efforts to increase awareness, training and education to the general population (Borene, 2011).The lack of clear policy enforcements leads to cyber terrorist attacks on government agencies, loss of information and privacy and loss of billions of dollars on an annual basis. One such incident is the cyber-attack on Blue Shield and hymn Blue Cross in February 2015. Even though no medical information was compromised, the incident breached notification laws at the state level.When technology moves faster than policy, in that respect are many cases of financial loss and exploitation, such as the period before the establishment of the open data policy, an open source project by the U.S
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.