SlideShare a Scribd company logo
1 of 13
By Jenna Barbee
Dr. Gurpreet Dhillon
Info 644
Power in Information Systems
Security
 What is Cyber Security? It is “the security of a
nation‟s computer and telecommunications
infrastructure” (Dhillon, 2013)
 Very little research exists regarding power in
Information Systems (IS) security. However, with
new policies promulgated over the past 12 years,
resistance is bound to occur, which makes a
fantastic breeding ground for research on how
effective the IS policy can be.
Clegg‟s Circuits of Power
 This theory “explains power relationships independent
of the particular circumstances of organizations or
their structure… [that] leads to a complete political
appraisal of the organization” (Dhillon, 2013)
 3 different „circuits‟ exist:
 Episodic – describes day-to-day interaction, work, and
outcomes
 Social Integration – views how social structures affect power
relationships and focuses on memberships and relationships
– has 2 subunits: membership and shared norms
 System Integration – looks at the technological means of
control of an organization over the social and physical
environment – has 2 sub elements: production and discipline
Episodic Circuit of Power
 The creation of the Department of Homeland Security
(DHS) has recently become greatly affected by cyber
security policy
 Between 2001 and 2007, very little occurred within policy
dealing with cyber security
 In late 2007 – early 2008, several security breeches hit
the Defense, State, Homeland Security, and Commerce
Departments, NASA, Veterans Affairs, & the National
Defense University
 These breeches led to HSPD 23 and NSPD 54 which in turn
created a Comprehensive National Cyber security Initiative (CNCI)
○ The CNCI was designed to combine the different federal agencies who
dealt with cyber security by developing a National Cyber Security
Center (NCSC)
○ Instead, this created power struggles and many complaints of secrecy
and too much classified data, and lacked any clear leadership roles
Episodic Circuit of Power
 The end of 2008 saw cyber security being jointly
handled by both the DHS‟s NCSC and the
National Security Agency (NSA)
 In early 2009, it was determined that the NSA would be
in charge of cyber security
 The expanding role of the military in cyber security
added an extra dimension of struggle for power
Social Integration Circuit of Power
 The DHS was originally introduced to legislation prior
to 9/11, and it was called the National Homeland
Security Agency; the bill was dropped due to
disinterest
 It was passed through after 9/11 and renamed DHS,
effectively sheltering the FEMA, the Customs Service,
Border Patrol, the Coast Guard, and other
departments under its umbrella
 It was brought to life under the Homeland Security Act (HSA)
in November 2002
 DHS was put into existence within 60 days of passing, in
January 2003
 Despite its creation, there still was not much emphasis on
the idea of cyber security
Social Integration Circuit of Power
 A cultural phenomenon began to emerge within
both politics and the general public: a desire to
appear „patriotic‟ by supporting everything the
federal government did without question
 Democrats began losing seats in Congress due to
having made reproachful remarks against provisions in
the HSA
 This phenomenon went hand-in-hand with criticizing
Bush or his administration because no one wanted to
portray the administration as failing and no one wanted
to end up becoming vilified or defamed
System Integration Circuit of
Power
 The Cyber Security Enhancement Act (CSEA) of
2002 produced the ability for companies to be able
to give their customers‟ electronic information
(such as personal email, chat conversations,
phone records, and online purchases) to any
government employee without any necessary
legal documents or court warrants
 If a company felt that the information held any
“immediate threat to national security interest” (Dhillon,
2013), they were required to make a good faith effort to
turn it over – this did not have to happen only when
requests were made by the federal government
System Integration Circuit of
Power
 The CSEA received resistance when it was
criticized for overriding personal liberty of privacy
protections of citizens based upon a very
subjective idea of what posed an „immediate
threat‟ to national security, without even a
provision for judicial review
 Even the controversial US Patriot Act requires that the
courts must be notified if a federal official looks into a
US citizen‟s personal emails, but the CSEA overrode
even this protection
System Integration Circuit of
Power
 Several other notable instances have occurred in
which cyber security legislation has incited
retaliation
 The Stop Online Piracy Act (SOPA) of 2012 garnered
much attention and displeasure form both individuals
and large corporations (many companies threatened to
„black out‟ in protest)
 In 2013, Edward Snowden released classified
information in regards to a clandestine surveillance
program called PRISM led by the NSA in which privately
owned companies like Verizon Wireless were required
to release customer information without customer
knowledge
Conclusion: Efficacy of US Cyber
Security Policy
 Power relationships played a very important role in
shaping consistent cyber security policy through
territory wars, Executive Orders, legislative
processes, patriotic culture, public criticism, and major
federal government shifts in power
 This struggle has ultimately weakened our position as
a cyber security power in a time of constant cyber
attacks from within our nation as well as from outside
 President Obama‟s 2013 Executive Order put into
law a cyber security policy in order to set up a
framework between the federal government and
private sector companies to allow the private sector
companies to better protect themselves and their
customers from government purview
Reference
 Dhillon, G. (2013). Enterprise Cyber Security:
Principles and practice. Washington, D.C.:
Paradigm Books.
Question
Why has it taken the US over 12
years to realize the significance
that cyber security plays in the
overall purpose of Homeland
Security?

More Related Content

What's hot

Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck Brooks
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technologykatieingersoll
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicShakas Technologies
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityFOTIOS ZYGOULIS
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internetjohn.niemela
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks IJECEIAES
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceMunich Re
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 

What's hot (20)

Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence AwardsChuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
Chuck Brooks wins Marketer of the Year at 2017 Cybersecurity Excellence Awards
 
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awardsChuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
Chuck brooks wins marketer of the year at 2017 cybersecurity excellence awards
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
SUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULESSUMMARY OF NEW IT RULES
SUMMARY OF NEW IT RULES
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
интернет
интернетинтернет
интернет
 
Hybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logicHybrid intrusion detection systems (hids) using fuzzy logic
Hybrid intrusion detection systems (hids) using fuzzy logic
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Finding balance in the age of open data
Finding balance in the age of open dataFinding balance in the age of open data
Finding balance in the age of open data
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Rule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurityRule of law in cyberspace as a means and way to cybersecurity
Rule of law in cyberspace as a means and way to cybersecurity
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Cyber risk challenge and the role of insurance
Cyber risk challenge and the role of insuranceCyber risk challenge and the role of insurance
Cyber risk challenge and the role of insurance
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Alfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparencyAlfredo Mendez - Mexico - personal data protection and transparency
Alfredo Mendez - Mexico - personal data protection and transparency
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 

Viewers also liked

Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Networkmacambo
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policyNextBigWhat
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathakChintan Pathak
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013M P Keshava
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...Ethan S. Burger
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsBenjamin Rohé
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)Gopal Choudhary
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnettingcbtvid
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShareSlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShareSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (19)

Rogers Russ Hacking A Terror Network
Rogers Russ   Hacking A Terror NetworkRogers Russ   Hacking A Terror Network
Rogers Russ Hacking A Terror Network
 
National cyber security policy
National cyber security policyNational cyber security policy
National cyber security policy
 
Review of national cyber security policy 2013 by chintan pathak
Review of national cyber security policy 2013   by chintan pathakReview of national cyber security policy 2013   by chintan pathak
Review of national cyber security policy 2013 by chintan pathak
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
NATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-UpsNATO Cyber Security Conference: Creating IT-Security Start-Ups
NATO Cyber Security Conference: Creating IT-Security Start-Ups
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
IP addressing
IP addressingIP addressing
IP addressing
 
Ipv4
Ipv4Ipv4
Ipv4
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Ip address
Ip addressIp address
Ip address
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to US Cyber Security Policy

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docxgertrudebellgrove
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxrossskuddershamus
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docxvickeryr87
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Small Business Trends
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportLandon Harrell
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Joe Orlando
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updatesInes Mergel
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchLaVerne Kemp
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibecargillfilberto
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALLouise Collins
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]Lucy Kitchin
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasioniosrjce
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchLaVerne Kemp
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 

Similar to US Cyber Security Policy (20)

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docxArticlesPublic-Private CybersecurityKristen E. Eichens.docx
ArticlesPublic-Private CybersecurityKristen E. Eichens.docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx250 words agree or disagreeFusion CentersFollowing the 91.docx
250 words agree or disagreeFusion CentersFollowing the 91.docx
 
Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Cyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act researchCyber intelligence sharing and protect act research
Cyber intelligence sharing and protect act research
 
Lewallen final
Lewallen   finalLewallen   final
Lewallen final
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
The Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy InvasionThe Cyberspace and Intensification of Privacy Invasion
The Cyberspace and Intensification of Privacy Invasion
 
E017242431
E017242431E017242431
E017242431
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 

Recently uploaded

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfUK Journal
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 

Recently uploaded (20)

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

US Cyber Security Policy

  • 1. By Jenna Barbee Dr. Gurpreet Dhillon Info 644
  • 2. Power in Information Systems Security  What is Cyber Security? It is “the security of a nation‟s computer and telecommunications infrastructure” (Dhillon, 2013)  Very little research exists regarding power in Information Systems (IS) security. However, with new policies promulgated over the past 12 years, resistance is bound to occur, which makes a fantastic breeding ground for research on how effective the IS policy can be.
  • 3. Clegg‟s Circuits of Power  This theory “explains power relationships independent of the particular circumstances of organizations or their structure… [that] leads to a complete political appraisal of the organization” (Dhillon, 2013)  3 different „circuits‟ exist:  Episodic – describes day-to-day interaction, work, and outcomes  Social Integration – views how social structures affect power relationships and focuses on memberships and relationships – has 2 subunits: membership and shared norms  System Integration – looks at the technological means of control of an organization over the social and physical environment – has 2 sub elements: production and discipline
  • 4. Episodic Circuit of Power  The creation of the Department of Homeland Security (DHS) has recently become greatly affected by cyber security policy  Between 2001 and 2007, very little occurred within policy dealing with cyber security  In late 2007 – early 2008, several security breeches hit the Defense, State, Homeland Security, and Commerce Departments, NASA, Veterans Affairs, & the National Defense University  These breeches led to HSPD 23 and NSPD 54 which in turn created a Comprehensive National Cyber security Initiative (CNCI) ○ The CNCI was designed to combine the different federal agencies who dealt with cyber security by developing a National Cyber Security Center (NCSC) ○ Instead, this created power struggles and many complaints of secrecy and too much classified data, and lacked any clear leadership roles
  • 5. Episodic Circuit of Power  The end of 2008 saw cyber security being jointly handled by both the DHS‟s NCSC and the National Security Agency (NSA)  In early 2009, it was determined that the NSA would be in charge of cyber security  The expanding role of the military in cyber security added an extra dimension of struggle for power
  • 6. Social Integration Circuit of Power  The DHS was originally introduced to legislation prior to 9/11, and it was called the National Homeland Security Agency; the bill was dropped due to disinterest  It was passed through after 9/11 and renamed DHS, effectively sheltering the FEMA, the Customs Service, Border Patrol, the Coast Guard, and other departments under its umbrella  It was brought to life under the Homeland Security Act (HSA) in November 2002  DHS was put into existence within 60 days of passing, in January 2003  Despite its creation, there still was not much emphasis on the idea of cyber security
  • 7. Social Integration Circuit of Power  A cultural phenomenon began to emerge within both politics and the general public: a desire to appear „patriotic‟ by supporting everything the federal government did without question  Democrats began losing seats in Congress due to having made reproachful remarks against provisions in the HSA  This phenomenon went hand-in-hand with criticizing Bush or his administration because no one wanted to portray the administration as failing and no one wanted to end up becoming vilified or defamed
  • 8. System Integration Circuit of Power  The Cyber Security Enhancement Act (CSEA) of 2002 produced the ability for companies to be able to give their customers‟ electronic information (such as personal email, chat conversations, phone records, and online purchases) to any government employee without any necessary legal documents or court warrants  If a company felt that the information held any “immediate threat to national security interest” (Dhillon, 2013), they were required to make a good faith effort to turn it over – this did not have to happen only when requests were made by the federal government
  • 9. System Integration Circuit of Power  The CSEA received resistance when it was criticized for overriding personal liberty of privacy protections of citizens based upon a very subjective idea of what posed an „immediate threat‟ to national security, without even a provision for judicial review  Even the controversial US Patriot Act requires that the courts must be notified if a federal official looks into a US citizen‟s personal emails, but the CSEA overrode even this protection
  • 10. System Integration Circuit of Power  Several other notable instances have occurred in which cyber security legislation has incited retaliation  The Stop Online Piracy Act (SOPA) of 2012 garnered much attention and displeasure form both individuals and large corporations (many companies threatened to „black out‟ in protest)  In 2013, Edward Snowden released classified information in regards to a clandestine surveillance program called PRISM led by the NSA in which privately owned companies like Verizon Wireless were required to release customer information without customer knowledge
  • 11. Conclusion: Efficacy of US Cyber Security Policy  Power relationships played a very important role in shaping consistent cyber security policy through territory wars, Executive Orders, legislative processes, patriotic culture, public criticism, and major federal government shifts in power  This struggle has ultimately weakened our position as a cyber security power in a time of constant cyber attacks from within our nation as well as from outside  President Obama‟s 2013 Executive Order put into law a cyber security policy in order to set up a framework between the federal government and private sector companies to allow the private sector companies to better protect themselves and their customers from government purview
  • 12. Reference  Dhillon, G. (2013). Enterprise Cyber Security: Principles and practice. Washington, D.C.: Paradigm Books.
  • 13. Question Why has it taken the US over 12 years to realize the significance that cyber security plays in the overall purpose of Homeland Security?