Emerging Cybersecurity Policies in the Federal Government

In: Computers and Technology

Submitted By csigel
Words 6354
Pages 26
Emerging Cybersecurity Policies in the Federal Government

Information Assurance Officer and Risk Management Analyst Department of Defense.

Emerging Cybersecurity Policies in the Federal Government

Information Assurance Officer and Risk Management Analyst Department of Defense.

Individual Assignment 1
September 16, 2014

Individual Assignment 1
September 16, 2014

Table of Contents Emerging Cybersecurity Policies in the Federal Government 3 Emerging Policies and Practices 4 Defense in Depth (DID) 5 Security Risk Frameworks 6 Test Driven Development 8 Business Service Frameworks 9 Acceptance and Preparation for Failure 11 The Federal Government and these Emerging Policies and Practices 13 The Feds and Defense in Depth 14 The Feds and Security Risk Frameworks 14 The Feds and Test Driven Development 16 The Feds and Business Service Frameworks 17 The Feds and Acceptance and Preparation for Failure 19 How could the Feds continue to improve 20 References 22

Emerging Cybersecurity Policies in the Federal Government
One of the largest and most important enterprises there is to protect in the cyber security realm are the various networks that make up the federal government. This massive undertaking to secure the systems, networks, and data of the various governmental agencies is a never ending uphill battle. The requirements of the federal government enterprise to be globally far reaching, as well as user friendly, scalable, and multi-functional lie in direct contrast with the additional requirements for the data the federal government enterprise harbors to be secure with extremely high availability, integrity and confidentiality. This balancing act of usability versus security is common among all enterprises, but it is radically highlighted within the federal government sector due to…...

Similar Documents

Federal Government Website Review

...Federal, LOCAL, AND NON-GOVERNMENT WEBSITE REVIEW Albert N. Prado HCS 457 MARCH 28, 2011 SANDI HOOKANA MSN, PMHCS FEDERAL, LOCAL, AND NON-GOVERNMENT WEBSITE REVIEW Vaccinations are a vital component for public health. Vaccinations prevent the effects of infectious disease such as pertussis. Pertussis or whooping cough is a highly contagious bacteria spread by coughs and sneezes. Small droplets containing the bacteria are transmitted through airborne methods, which cause the disease to be spread from person to person. In this website, review will inform and provide information over different aspects of government and non-government functions. The federal, local, and non-governmental agencies websites provide similar and different information. These different agencies have different structures. The review will discuss these structures. The different agencies provide different and similar structures concerning pertussis. The government and non-government agencies work together in different capacities. These agencies have public and community health purposes and work together in different capacities to provide public health. Information derived from each of the various websites overlap including the definition of pertussis. A fact sheet provides the number of cases reported in a pertussis summary report and questions and answers. Pertussis vaccination information is a major overlap between the various websites. However, the immunity from vaccines wears off over time,......

Words: 989 - Pages: 4

Government Policy

...1) What is Government Policy The term ‘government policy’ can be used to describe any course of action which intends to change a certain situation. Think of policies as a starting point for government to take a course of action that makes a real life change. Government uses policy to tackle a wide range of issues. In fact, it can make policies that could change how much tax you pay, parking fines, immigration laws and pensions. Law can also be changed by government, so when they create a policy it can be made to affect specific groups of people or everyone in our society. Government departments (such as education or finance), agencies (like Land and Property Services or the Housing Executive) and councils all make policies that affect our lives. These policies can be influenced in many ways: political parties or individual politicians lobbying decision makers in government voluntary organisations community groups public opinion public consultations the media 2) Influence to Population Government make policies to population or population policy to determine the principles, objectives and policies adopted by the State as regards population issues for the purpose of influencing the population status, including variables in population growth and its main elements (fertility, births, deaths, geographical distribution, immigration, population composition such as population youthfulness or rising rate of the elderly, as well as general issues......

Words: 755 - Pages: 4

Cybersecurity Policy Issues

...lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users. INTRODUCTION From the year 2000 to 2010, the users’ on the Internet has escalated to approximately five times its original users. The Internet provides a variety of services in which its users transmits large amounts of proprietary and personal data. The increase in Internet users and the vital data transmitted has enticed criminals to use the internet to obtain vital information. This is done through the use of malicious traffic. Malicious traffic can be defined as Internet traffic used to compromise a system and/or to conceivably impair the privacy of consumers data stored on......

Words: 1930 - Pages: 8

Branches of Federal Government

...Branches of the Federal Government Name Institution The US federal government constitutes three arms namely: the legislature, executive and justice. The executive constitutes of the president and about 5000 workers, the legislature constitutes the representatives and the judicial is made up of both the Supreme Court and lower courts. (Truman, 1993) The legislative arm of the government is also called Congress. It is divided into the senate which has 100 senators and 435 representatives. The number of representatives’ is determined by the population of people in a given state. The senators and representatives are elected by eligible voters in their states (Truman, 1993). It is charged with the making of national laws and allocation of funds that will assist in running of the federal government. They also provide assistance to the 50 US States (Truman, 1993). Members of the congress should vote according to the views of the constituents who elected them. Members of the congress should therefore visit their home districts and keep in touch with their constituent views. They should also be in good communication terms with their local political leaders. Some congress men pay attention more than others but they all at one point will go back to their homes. If one hopes to be elected again then they ought not to ignore their own constituency. People will always vote for a candidate who cares for them all the time and not one that just rushes to his people...

Words: 812 - Pages: 4

The Great Divide Indigenous Health and Federal Government Policy

...Indigenous Health and Federal Government Policy Closing the Gap The ‘closing the gap’ is a strategy whose aims are to give a boost to the indigenous people life expectancy rates. This policy was made in reference to the sensitive areas of child mortality, life expectancy, early childhood education, achievements in education and the employment opportunities of the indigenous communities of Australia. It was endorsed by the Australian government in 2008 to close the formal gap between the indigenous communities of Australia and the ‘white’ communities and bring a sense of social justice to all communities in Australia; most especially boost the health system of the indigenous. The Council of Australian Governments (COAG), in the Closing the Gap initiative has set certain targets that seek to improve the healthcare system of the indigenous population. The targets of the ‘Closing the Gap’ initiative include: education, economic participation, early childhood, housing, health and remote service delivery. The subsequent achievement of this particular set system to cope with the problems facing the indigenous will hugely depend on an effective implementation of the set policy targets. This is because the set targets are as of today some of the common disadvantages that the indigenous people face (Ryan 2009). The government clearly understands the enormous task that faces it and has rolled out the project over a number of years. The set policies of......

Words: 2242 - Pages: 9

Government Policy

...Q1. Market Failure: is to do with not having enough resources to produce enough goods and services needed neither by the government nor by the society, as a result of this failure, the government develop a role to intervene in the economy in order to overcome these problems. 1. Public goods: According to the business dictionary, public good is an item whose consumption is not decided by the individual consumer but by the society as a whole; and which is financed by taxation. A public good or service may be consumed without reducing the amount available for others and cannot be withheld from those who do not pay for it. E.g. parks, police services, fire services etc. Consumers have an incentive to not reveal their willingness and ability to pay for public goods if they believe that they will be expected or required to contribute to financing the public good accordingly by the government. After all, if the public good is supplied, it will be available to them just as it would be to anyone else because pure public goods are non-excludable. This is the essence of the “free rider problem”: the incentive which consumers have to avoid contributing to financing public goods in proportion to their valuation of such good. Good examples to use include TV licence dodgers and people who choose to evade the Council Tax but who still receive local authority services. Another example might be a group of residents in a block of flats who all stand to benefit from the refurbishment of......

Words: 3687 - Pages: 15

Emerging Cybersecurity Strategies

...an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul in the system; however, the U.S. should have spent more on cybersecurity and had to learn this lesson the hard way. The......

Words: 2624 - Pages: 11

Government Policies

...IN THIS CHAPTER YOU WILL . . . Examine the ef fects of government policies that place a ceiling on prices Examine the ef fects of government policies that put a floor under prices S U P P LY, DEMAND, GOVERNMENT AND POLICIES Economists have two roles. As scientists, they develop and test theories to explain the world around them. As policy advisers, they use their theories to help change the world for the better. The focus of the preceding two chapters has been scientific. We have seen how supply and demand determine the price of a good and the quantity of the good sold. We have also seen how various events shift supply and demand and thereby change the equilibrium price and quantity. This chapter offers our first look at policy. Here we analyze various types of government policy using only the tools of supply and demand. As you will see, the analysis yields some surprising insights. Policies often have effects that their architects did not intend or anticipate. We begin by considering policies that directly control prices. For example, rentcontrol laws dictate a maximum rent that landlords may charge tenants. Minimumwage laws dictate the lowest wage that firms may pay workers. Price controls are 117 Consider how a tax on a good af fects the price of the good and the quantity sold Learn that taxes levied on buyers and taxes levied on sellers are equivalent See how the burden of a tax is split between buyers and......

Words: 11931 - Pages: 48

Policy Making in the Federal System Pol201American National Government

...Federal Highway Policy Xanthyne Perrin POL 201 American National Government Professor Angela Cranon-Charles June 8, 2015 When we define the Federal Highway policy, we initially think of the many rules and guidelines that are to be followed when considering operating a motor vehicle. The Federal Highway Policy is placed to make a safer driving experience for many road users that are considering traveling by a motor vehicle. The creation of the Federal Highway Policy system in 1956, which was funded by road users who were paying a federal fuel tax of 18.3 cents per gallon of gasoline (The Heritage Foundation, 2010), which initially lost its since of purpose and today no more than 65% of all federal trust fund spending’s goes to general purpose roads. Like any policy in reference to federalism, there are the pros as well as the cons to any situation. The minimum age of drinking, the safety of the way these roads operate and the speed limits are all considered when discussing the Federal Highway Policy as well as the many issues that takes place in reference to the three issues listed. As we are all familiar, the legal drinking age of alcohol consumption is 21. There are many issues to the legal drinking age and why some agree that is should be lowered. Back in the 1970’s, a trend toward lowering the minimum legal drinking age 18, 19, or 20 took place in the states providing many natural experiments (Wagenarr & Toomey, 2005). As a result of lowering the legal......

Words: 1196 - Pages: 5

Government and Policies

...Unit 1 Government and Policies UK Government 01 P1 There is three main components to the structure of the UK government, the first and most important being the central government(Parliament) this contains the House of Commons and the House of Lords, this is where all the main decisions about how the UK operates happen, the next is the devolved parliaments(e.g. The Scottish parliament and the welsh assembly) these are responsible for managing Scotland and Wales idiosyncratically, the Scottish parliament has the power to produce laws and bills without the need of the UK parliament agreeing, the Welsh on the other hand do not have such powers. Finally there are the local authorities these are made up of County councils, District Councils, Parish Councils etc these do things within certain areas or constituencies throughout the UK. The European parliament also plays a big role in the running and decision making of the UK parliament, Established in 1952, the EP is based in Brussels and Strasbourg, it has also been known to assemble in Luxembourg also, it has 751 members and is run by Martin Schulz, it influences EU laws within the UK and decides international agreements. P2 Each department of the government is important in its own rights, there are too many departments to name here but the main three that support the public services would be: The Ministry of Defence (MoD): The MoD’s main priority is implementing the defence policy set by the government and......

Words: 1161 - Pages: 5

Federal Government

...threats and policies that govern it. We will also examine the classes of data that the defense contractor must protect and the potential cyber defense technologies that could be implemented in a prioritized strategy to secure that information. This briefing will also provide the priorities for legal and policy compliance amongst Defense contractors. Because Hytema is a Defense contractor the organization must work closely with the Federal Government causing them to adopt many of their policies and regulations. The most strategic and informative policy is the Federal Information Security Management Act (FISMA). All departments and agencies are required to coordinate and cooperate with the Department of Homeland Security as it carries out its cybersecurity responsibility actives as noted in the Office of Management Budget (OMB) (Dhs.gov, 2015) 2. Social Importance 2.1 Effects on society of the sector Defense contractors contribute to a very large part of what is deemed as societal importance in today’s society, however they are often overshadowed. Defense contractors that work for the Department of Defense within the cyber technology sector take up almost eighty percent of the DoD staff (Defense.gov, 2015). The Department of Defense states that its main objective is not tanks, planes or ships but its people. Quality is divided into four unique sections; policy, finance, force readiness and purchasing. A policy coordinator who creates plans and policies to......

Words: 1094 - Pages: 5

Federal Government Prevention of Bullying

...Federal Government Prevention of Bullying We have all heard the words; the words that tear us down and break us apart. A person can only bend so far before they break. No one is immune to it, we are all capable of bullying. By no means is bullying right; often times the repercussions of being bullied are devastating. Although there is no Federal law currently in place to prevent bullying, there are discrimination and harassment laws and many states have anti-bullying laws; there is hope for the Federal government to follow suit in enacting anti-bullying laws. Bullying in the United States is continuing to get expand, but the awareness of bullying is also increasing. There are several ideas of what exactly bullying is. The most common definition of bullying is “purposeful attempts to control another person through verbal abuse - which can be in the tone of voice or in content such as teasing or threats.” Sometimes the verbal abuse turns into physical abuse. Bullying is not limited to just schools; bullying is taking place in workplaces, homes, nursing homes and even in the military ("Why do People Bully?"). Research has proven that bullying happens more frequently in the middle school age years than any other school years (“New ways to stop bullying”). Over 160,000 children stay home from school every day in fear of being bullied (“Bullying and Suicide”). Seven percent of eight grade students stay home at least one day a month due to continued bullying and harassment by......

Words: 2954 - Pages: 12

Ethics in the Federal Government

...Are Ethics Laws in the Federal Government a Violation of Constitutional Rights? Abstract The paper explores the United States Government’s efforts to put in place laws that guide the ethical behavior of its civil service employees. From the founding of the nation, ensuring ethical behavior by government employees has been a recurring theme, and legislation, laws, and executive orders have been implemented at each stage of our government’s growth to guide federal employees in the ethical administration of their duties. However, at what point do the laws become too restrictive on the very citizens who have sworn to uphold our nation’s democratic values? A history of legislation, laws and executive orders is given along with the eventual backlash of court cases and demands for reform based on constitutional rights. For purposed of brevity, this analysis will focus on federal employees. Are Ethics Laws in the Federal Government a Violation of Constitutional Rights? Over two hundred years ago, with regard to ethics in the federal government, Thomas Jefferson wrote the following words “The right of any officer to give his vote at elections as a qualified citizen is not meant to be restrained, nor, however given, shall it have any effect to his prejudice; but it is expected that he will not attempt to influence the votes of others, nor take any part in the business of electioneering, that being deemed inconsistent with the spirit of the Constitution and his......

Words: 2748 - Pages: 11

Alternating State Government It Security Policies

...Alternating State Government IT Security Policies University of Maryland University College Europe Instructor: Professor Cybersecurity in Government Organizations CSIA 360 24 April 2016 The purpose of IT Security Policies within the state governments IT security policies are the foundation that any business or government should have implemented with their IT systems before the systems are going to be accessed or in other terms used by users and or customers. The successful implementation of such IT security policies are necessary for the infrastructure of IT systems that are going to be operated safely. IT security policies normally are papers that address the requirements of the system’s rules that are to be fulfilled, which usually is a defined set of rules. The individual IT security policy addresses a specific area in detail like such as an acceptable user policy that outlines how the system is to be used with what each user can perform on the system (SANS, 2016). Each individual state is responsible for implementing its own IT security policy because there is no precise must do practice in place when it comes to fulfilling IT security policies for the state governments. State agencies and offices are responsible for their own IT security policies. Each state addresses IT security policies and the associated problems with implementing these, but two states barely mention the topic, which reflects with rare information concerning their cybersecurity......

Words: 1515 - Pages: 7

Cost Accounting & Federal Government

...Cost Accounting and the Federal Government Washington will spend $782 billion more from 2000 to 2003 than it did between 1996 and 1999--an increase of $5,000 per household. With public demand to reduce federal spending, the Federal Government is rethinking the way that it provides goods and services. In order to cut spending the Federal Government is looking for new approaches to old problems. The biggest problem being, accountability. One approach to the accountability problem is to implement managerial cost accounting practices throughout the Federal Government and it’s programs. Cost accounting would help the government focus policy and funding decisions around relevant information. It would help program managers in monitoring performance and in reporting results to Congress and the taxpayers. The five standards for managerial cost accounting that have been suggested are: 1. Accumulating and reporting costs of activities on a regular basis for management information purposes. 2. Establishing responsibility segments to match costs with outputs. 3. Determining the full cost of government goods and services. 4. Recognizing the costs of goods and services provided by one federal entity to another. 5. Using appropriate costing methodologies to accumulate and assign costs to outputs. The costs in a federal government cost accounting system would be divided into two categories: program costs and costs not assigned. Each of these has sub-categories. ......

Words: 597 - Pages: 3

Lançamentos | Le Grinch VF | 風来のシレン2