SlideShare uma empresa Scribd logo
1 de 9
Elizabeth Stevens
Dr. Gurpreet Dhillon
INFO – 644, CT3
• Subramanian (2010) defines cyber security as:
• “The security of a nation’s computer and telecommunications
infrastructure as well as the data stored within the computers from
outside attack” (Dhillon, 2013, p. 188).
• Cyber security includes protection of:
• Hardware
• Software
• Information in both public and private sectors
• Military
• Communications networks
• Electrical grids
• Power plants
• The history of U.S. cyber security policy is examined
through Clegg’s theory of circuits of power.
• Circuits of power “explains power relationships
independent of the particular circumstances of
organizations or their structure. The application of the
theory leads to a complete political appraisal of the
organization” (Dhillon, 2013, p. 190).
• Power circulates in three different circuits:
• Episodic circuit
• Social integration circuit
• System integration circuit
• Episodic power – describes the day-to-day interaction,
work, and outcomes (p. 190); can be recognized by
outcomes and actions.
• The attacks of 9/11 led to the creation of the Department
of Homeland Security (DHS); 22 separate departments
merged into one agency.
• The new position of Secretary of DHS would come with
great political power:
• Appointing responsibilities
• Directing funds and resources
• Implementing personnel policy
• Oversight
• Creation of DHS led to issues within Congress and other
parts of the federal government:
• Committee Chairs did not want to give up their powers.
• If one committee exercised power, it was resisted by other ones.
• Funds were misappropriated across different agencies nationwide.
• Richard Clarke, author of “National Plan to Secure Cyberspace”
was forced to resign.
• Between 2003-2005, there was no real cyber security strategy;
lack of leadership and “turf wars” kept cyber security czars from
developing cyber security strategies.
• Major cyber security breaches in 2007 and 2008 affected State
Dept., DoD, DHS, NASA and the VA.
• These breaches prompted directives HSPD 23 and
NSPD 54 that led to Comprehensive National
CyberSecurity Inititative (CNCI) and the National Cyber
Security Center (NCSC).
• The NSA wanted to be in charge of cyber security.
• In 2009, Obama promised to develop a national cyber
security policy and appoint a federal cyber security
coordinator.
• This position would be above NSA and DHS and
depends on the collaboration between different
organizations.
• According to Dhillon (2013), “episodic power
relationships played a crucial part in the first decade of
• A month after 9/11, Senator Lieberman introduced a bill
to establish a DHS that had aspects of cyber security:
• Maintaining a hub of cyber security experts
• Sharing of information concerning cyber security in the U.S.
• Establishing cyber security standards with the FCC
• Certifying national preparedness for cyber attacks
• After DHS was created, cyber security matters took a low
priority
• DHS officials and loyalists to Bush, did not criticize its
lacking cyber security initiatives as most of the country
supported the government’s national security endeavors
unquestionably.
• System integration has two subcomponents:
• Production
• Discipline
• The Cyber Security Enhancement Act (CSEA) of 2002
grants companies permission to release customers’
electronic info to government employees without
warrants or legal documents.
• Reports were exempt from Freedom of Information Act requests
• Companies providing info were free from being sued by customers
• Customers did not have to be notified that their info was released
• Stop Online Piracy Act (SOPA) of 2012 was met with a
huge public backlash; major internet companies opposed
SOPA.
• Cyber security policy was drastically affected by:
• Turf wars
• Executive orders
• Legislative procedures
• Patriotic culture
• Public backlash
• Major shifts in power within the federal government
• Obama’s 2013 executive order to put cyber security
policy into law will design a framework for the
government and the private sector to “allow intelligence
to be gathered on cyber threats to privately owned critical
infrastructure…so they can better protect themselves”
(Dhillon, 2013, p. 202).

Mais conteúdo relacionado

Mais procurados

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapanrmackinnon
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united statesDeniseMitchell
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshMd. Mehedi Al Hasan Rakib
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdownOtieno Antony
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13Phil Agcaoili
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 

Mais procurados (20)

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 

Semelhante a CT3- STEVENS

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internetjohn.niemela
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022Dawn Yankeelov
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonPatton Boggs LLP
 
CST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity PolicyCST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity Policyoudesign
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Module II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxModule II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxChayaSorir
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docxgertrudebellgrove
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceGwanhoo Lee
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 

Semelhante a CT3- STEVENS (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
CST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity PolicyCST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity Policy
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Module II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxModule II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptx
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 

Último

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

CT3- STEVENS

  • 1. Elizabeth Stevens Dr. Gurpreet Dhillon INFO – 644, CT3
  • 2. • Subramanian (2010) defines cyber security as: • “The security of a nation’s computer and telecommunications infrastructure as well as the data stored within the computers from outside attack” (Dhillon, 2013, p. 188). • Cyber security includes protection of: • Hardware • Software • Information in both public and private sectors • Military • Communications networks • Electrical grids • Power plants
  • 3. • The history of U.S. cyber security policy is examined through Clegg’s theory of circuits of power. • Circuits of power “explains power relationships independent of the particular circumstances of organizations or their structure. The application of the theory leads to a complete political appraisal of the organization” (Dhillon, 2013, p. 190). • Power circulates in three different circuits: • Episodic circuit • Social integration circuit • System integration circuit
  • 4. • Episodic power – describes the day-to-day interaction, work, and outcomes (p. 190); can be recognized by outcomes and actions. • The attacks of 9/11 led to the creation of the Department of Homeland Security (DHS); 22 separate departments merged into one agency. • The new position of Secretary of DHS would come with great political power: • Appointing responsibilities • Directing funds and resources • Implementing personnel policy • Oversight
  • 5. • Creation of DHS led to issues within Congress and other parts of the federal government: • Committee Chairs did not want to give up their powers. • If one committee exercised power, it was resisted by other ones. • Funds were misappropriated across different agencies nationwide. • Richard Clarke, author of “National Plan to Secure Cyberspace” was forced to resign. • Between 2003-2005, there was no real cyber security strategy; lack of leadership and “turf wars” kept cyber security czars from developing cyber security strategies. • Major cyber security breaches in 2007 and 2008 affected State Dept., DoD, DHS, NASA and the VA.
  • 6. • These breaches prompted directives HSPD 23 and NSPD 54 that led to Comprehensive National CyberSecurity Inititative (CNCI) and the National Cyber Security Center (NCSC). • The NSA wanted to be in charge of cyber security. • In 2009, Obama promised to develop a national cyber security policy and appoint a federal cyber security coordinator. • This position would be above NSA and DHS and depends on the collaboration between different organizations. • According to Dhillon (2013), “episodic power relationships played a crucial part in the first decade of
  • 7. • A month after 9/11, Senator Lieberman introduced a bill to establish a DHS that had aspects of cyber security: • Maintaining a hub of cyber security experts • Sharing of information concerning cyber security in the U.S. • Establishing cyber security standards with the FCC • Certifying national preparedness for cyber attacks • After DHS was created, cyber security matters took a low priority • DHS officials and loyalists to Bush, did not criticize its lacking cyber security initiatives as most of the country supported the government’s national security endeavors unquestionably.
  • 8. • System integration has two subcomponents: • Production • Discipline • The Cyber Security Enhancement Act (CSEA) of 2002 grants companies permission to release customers’ electronic info to government employees without warrants or legal documents. • Reports were exempt from Freedom of Information Act requests • Companies providing info were free from being sued by customers • Customers did not have to be notified that their info was released • Stop Online Piracy Act (SOPA) of 2012 was met with a huge public backlash; major internet companies opposed SOPA.
  • 9. • Cyber security policy was drastically affected by: • Turf wars • Executive orders • Legislative procedures • Patriotic culture • Public backlash • Major shifts in power within the federal government • Obama’s 2013 executive order to put cyber security policy into law will design a framework for the government and the private sector to “allow intelligence to be gathered on cyber threats to privately owned critical infrastructure…so they can better protect themselves” (Dhillon, 2013, p. 202).