SlideShare uma empresa Scribd logo
1 de 13
By Jenna Barbee
Dr. Gurpreet Dhillon
Info 644
Power in Information Systems
Security
 What is Cyber Security? It is “the security of a
nation‟s computer and telecommunications
infrastructure” (Dhillon, 2013)
 Very little research exists regarding power in
Information Systems (IS) security. However, with
new policies promulgated over the past 12 years,
resistance is bound to occur, which makes a
fantastic breeding ground for research on how
effective the IS policy can be.
Clegg‟s Circuits of Power
 This theory “explains power relationships independent
of the particular circumstances of organizations or
their structure… [that] leads to a complete political
appraisal of the organization” (Dhillon, 2013)
 3 different „circuits‟ exist:
 Episodic – describes day-to-day interaction, work, and
outcomes
 Social Integration – views how social structures affect power
relationships and focuses on memberships and relationships
– has 2 subunits: membership and shared norms
 System Integration – looks at the technological means of
control of an organization over the social and physical
environment – has 2 sub elements: production and discipline
Episodic Circuit of Power
 The creation of the Department of Homeland Security
(DHS) has recently become greatly affected by cyber
security policy
 Between 2001 and 2007, very little occurred within policy
dealing with cyber security
 In late 2007 – early 2008, several security breeches hit
the Defense, State, Homeland Security, and Commerce
Departments, NASA, Veterans Affairs, & the National
Defense University
 These breeches led to HSPD 23 and NSPD 54 which in turn
created a Comprehensive National Cyber security Initiative (CNCI)
○ The CNCI was designed to combine the different federal agencies who
dealt with cyber security by developing a National Cyber Security
Center (NCSC)
○ Instead, this created power struggles and many complaints of secrecy
and too much classified data, and lacked any clear leadership roles
Episodic Circuit of Power
 The end of 2008 saw cyber security being jointly
handled by both the DHS‟s NCSC and the
National Security Agency (NSA)
 In early 2009, it was determined that the NSA would be
in charge of cyber security
 The expanding role of the military in cyber security
added an extra dimension of struggle for power
Social Integration Circuit of Power
 The DHS was originally introduced to legislation prior
to 9/11, and it was called the National Homeland
Security Agency; the bill was dropped due to
disinterest
 It was passed through after 9/11 and renamed DHS,
effectively sheltering the FEMA, the Customs Service,
Border Patrol, the Coast Guard, and other
departments under its umbrella
 It was brought to life under the Homeland Security Act (HSA)
in November 2002
 DHS was put into existence within 60 days of passing, in
January 2003
 Despite its creation, there still was not much emphasis on
the idea of cyber security
Social Integration Circuit of Power
 A cultural phenomenon began to emerge within
both politics and the general public: a desire to
appear „patriotic‟ by supporting everything the
federal government did without question
 Democrats began losing seats in Congress due to
having made reproachful remarks against provisions in
the HSA
 This phenomenon went hand-in-hand with criticizing
Bush or his administration because no one wanted to
portray the administration as failing and no one wanted
to end up becoming vilified or defamed
System Integration Circuit of
Power
 The Cyber Security Enhancement Act (CSEA) of
2002 produced the ability for companies to be able
to give their customers‟ electronic information
(such as personal email, chat conversations,
phone records, and online purchases) to any
government employee without any necessary
legal documents or court warrants
 If a company felt that the information held any
“immediate threat to national security interest” (Dhillon,
2013), they were required to make a good faith effort to
turn it over – this did not have to happen only when
requests were made by the federal government
System Integration Circuit of
Power
 The CSEA received resistance when it was
criticized for overriding personal liberty of privacy
protections of citizens based upon a very
subjective idea of what posed an „immediate
threat‟ to national security, without even a
provision for judicial review
 Even the controversial US Patriot Act requires that the
courts must be notified if a federal official looks into a
US citizen‟s personal emails, but the CSEA overrode
even this protection
System Integration Circuit of
Power
 Several other notable instances have occurred in
which cyber security legislation has incited
retaliation
 The Stop Online Piracy Act (SOPA) of 2012 garnered
much attention and displeasure form both individuals
and large corporations (many companies threatened to
„black out‟ in protest)
 In 2013, Edward Snowden released classified
information in regards to a clandestine surveillance
program called PRISM led by the NSA in which privately
owned companies like Verizon Wireless were required
to release customer information without customer
knowledge
Conclusion: Efficacy of US Cyber
Security Policy
 Power relationships played a very important role in
shaping consistent cyber security policy through
territory wars, Executive Orders, legislative
processes, patriotic culture, public criticism, and major
federal government shifts in power
 This struggle has ultimately weakened our position as
a cyber security power in a time of constant cyber
attacks from within our nation as well as from outside
 President Obama‟s 2013 Executive Order put into
law a cyber security policy in order to set up a
framework between the federal government and
private sector companies to allow the private sector
companies to better protect themselves and their
customers from government purview
Reference
 Dhillon, G. (2013). Enterprise Cyber Security:
Principles and practice. Washington, D.C.:
Paradigm Books.
Question
Why has it taken the US over 12
years to realize the significance
that cyber security plays in the
overall purpose of Homeland
Security?

Mais conteúdo relacionado

Mais procurados

Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
FOTIOS ZYGOULIS
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
smita mitra
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
Abegail Roberts
 

Mais procurados (20)

Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
интернет
интернетинтернет
интернет
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logic
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 

Destaque

National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
NextBigWhat
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
Ethan S. Burger
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
cbtvid
 

Destaque (19)

Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Network
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4
Ipv4Ipv4
Ipv4
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Ip address
Ip addressIp address
Ip address
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Semelhante a US Cyber Security Policy

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
gertrudebellgrove
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
rossskuddershamus
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx
vickeryr87
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
LaVerne Kemp
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
cargillfilberto
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
LaVerne Kemp
 

Semelhante a US Cyber Security Policy (20)

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
Lewallen final
Lewallen   finalLewallen   final
Lewallen final
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
E017242431
E017242431E017242431
E017242431
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

US Cyber Security Policy

  • 1. By Jenna Barbee Dr. Gurpreet Dhillon Info 644
  • 2. Power in Information Systems Security  What is Cyber Security? It is “the security of a nation‟s computer and telecommunications infrastructure” (Dhillon, 2013)  Very little research exists regarding power in Information Systems (IS) security. However, with new policies promulgated over the past 12 years, resistance is bound to occur, which makes a fantastic breeding ground for research on how effective the IS policy can be.
  • 3. Clegg‟s Circuits of Power  This theory “explains power relationships independent of the particular circumstances of organizations or their structure… [that] leads to a complete political appraisal of the organization” (Dhillon, 2013)  3 different „circuits‟ exist:  Episodic – describes day-to-day interaction, work, and outcomes  Social Integration – views how social structures affect power relationships and focuses on memberships and relationships – has 2 subunits: membership and shared norms  System Integration – looks at the technological means of control of an organization over the social and physical environment – has 2 sub elements: production and discipline
  • 4. Episodic Circuit of Power  The creation of the Department of Homeland Security (DHS) has recently become greatly affected by cyber security policy  Between 2001 and 2007, very little occurred within policy dealing with cyber security  In late 2007 – early 2008, several security breeches hit the Defense, State, Homeland Security, and Commerce Departments, NASA, Veterans Affairs, & the National Defense University  These breeches led to HSPD 23 and NSPD 54 which in turn created a Comprehensive National Cyber security Initiative (CNCI) ○ The CNCI was designed to combine the different federal agencies who dealt with cyber security by developing a National Cyber Security Center (NCSC) ○ Instead, this created power struggles and many complaints of secrecy and too much classified data, and lacked any clear leadership roles
  • 5. Episodic Circuit of Power  The end of 2008 saw cyber security being jointly handled by both the DHS‟s NCSC and the National Security Agency (NSA)  In early 2009, it was determined that the NSA would be in charge of cyber security  The expanding role of the military in cyber security added an extra dimension of struggle for power
  • 6. Social Integration Circuit of Power  The DHS was originally introduced to legislation prior to 9/11, and it was called the National Homeland Security Agency; the bill was dropped due to disinterest  It was passed through after 9/11 and renamed DHS, effectively sheltering the FEMA, the Customs Service, Border Patrol, the Coast Guard, and other departments under its umbrella  It was brought to life under the Homeland Security Act (HSA) in November 2002  DHS was put into existence within 60 days of passing, in January 2003  Despite its creation, there still was not much emphasis on the idea of cyber security
  • 7. Social Integration Circuit of Power  A cultural phenomenon began to emerge within both politics and the general public: a desire to appear „patriotic‟ by supporting everything the federal government did without question  Democrats began losing seats in Congress due to having made reproachful remarks against provisions in the HSA  This phenomenon went hand-in-hand with criticizing Bush or his administration because no one wanted to portray the administration as failing and no one wanted to end up becoming vilified or defamed
  • 8. System Integration Circuit of Power  The Cyber Security Enhancement Act (CSEA) of 2002 produced the ability for companies to be able to give their customers‟ electronic information (such as personal email, chat conversations, phone records, and online purchases) to any government employee without any necessary legal documents or court warrants  If a company felt that the information held any “immediate threat to national security interest” (Dhillon, 2013), they were required to make a good faith effort to turn it over – this did not have to happen only when requests were made by the federal government
  • 9. System Integration Circuit of Power  The CSEA received resistance when it was criticized for overriding personal liberty of privacy protections of citizens based upon a very subjective idea of what posed an „immediate threat‟ to national security, without even a provision for judicial review  Even the controversial US Patriot Act requires that the courts must be notified if a federal official looks into a US citizen‟s personal emails, but the CSEA overrode even this protection
  • 10. System Integration Circuit of Power  Several other notable instances have occurred in which cyber security legislation has incited retaliation  The Stop Online Piracy Act (SOPA) of 2012 garnered much attention and displeasure form both individuals and large corporations (many companies threatened to „black out‟ in protest)  In 2013, Edward Snowden released classified information in regards to a clandestine surveillance program called PRISM led by the NSA in which privately owned companies like Verizon Wireless were required to release customer information without customer knowledge
  • 11. Conclusion: Efficacy of US Cyber Security Policy  Power relationships played a very important role in shaping consistent cyber security policy through territory wars, Executive Orders, legislative processes, patriotic culture, public criticism, and major federal government shifts in power  This struggle has ultimately weakened our position as a cyber security power in a time of constant cyber attacks from within our nation as well as from outside  President Obama‟s 2013 Executive Order put into law a cyber security policy in order to set up a framework between the federal government and private sector companies to allow the private sector companies to better protect themselves and their customers from government purview
  • 12. Reference  Dhillon, G. (2013). Enterprise Cyber Security: Principles and practice. Washington, D.C.: Paradigm Books.
  • 13. Question Why has it taken the US over 12 years to realize the significance that cyber security plays in the overall purpose of Homeland Security?