Cyber and Homeland Security Policy

Cyber and Homeland Security Policy

This policy was meant to establish strategies, provide guidelines as well as implement the actions on cyber security in the United States.  It also strengthened existing policies on protection and privacy of information that was entrusted the federal government. Also, it was to clarify the federal agencies responsible for cyber security. To administer this policy the federal government was tasked to integrate its technical, as well as organizational functions to ensure threats together with vulnerabilities, are addressed by sophisticated cyber security (Hinrichs, 2012).

It provided for a comprehensive approach towards cyber security.  It also provides a mechanism for anticipated cyber threats in future in all national structures.  It provided for a direction on how to collect information concerning the cyber threats against US (Hinrichs, 2012). It also described the functions, missions, coordination mechanisms and operations on some organization within the federal government.

This directive was to implement some of the National Strategy for Homeland Security such as management of national, critical infrastructure identification, protection and prioritization, National Preparedness and National Security professional Development policies (Hinrichs, 2012).

Upon executing this plan, it could improve the Nation’s security towards any cyber threats and in particular the capability of US to prevent, detect, attribute, interdict, monitor as well as protection against access by unauthorized people to the National Security System together with private sector systems (Hinrichs, 2012).

The policy was to maintain a limited accessibility in conjunction with the use of cyberspace for the major purpose of national security. Despite the expansion of usage of internet to all citizens, it posed both challenges and opportunities (Hinrichs, 2012). In the real sense, it enhanced efficiency in military operations, private sector performance as well as government. Conversely, it invented threats to the users hence there was a need for quick action to safeguard the all the steps gained in sharing information.

References

Hinrichs, S. K. (2012). Cyber Security Objectives. Cyber Security Policy Guidebook, 39-67. doi:10.1002/9781118241530.ch3

 

Place this order or similar order and get an amazing discount. USE Discount code “GWEXDDSRGCF10” for 10% discount