SlideShare une entreprise Scribd logo
1  sur  9
Elizabeth Stevens
Dr. Gurpreet Dhillon
INFO – 644, CT3
• Subramanian (2010) defines cyber security as:
• “The security of a nation’s computer and telecommunications
infrastructure as well as the data stored within the computers from
outside attack” (Dhillon, 2013, p. 188).
• Cyber security includes protection of:
• Hardware
• Software
• Information in both public and private sectors
• Military
• Communications networks
• Electrical grids
• Power plants
• The history of U.S. cyber security policy is examined
through Clegg’s theory of circuits of power.
• Circuits of power “explains power relationships
independent of the particular circumstances of
organizations or their structure. The application of the
theory leads to a complete political appraisal of the
organization” (Dhillon, 2013, p. 190).
• Power circulates in three different circuits:
• Episodic circuit
• Social integration circuit
• System integration circuit
• Episodic power – describes the day-to-day interaction,
work, and outcomes (p. 190); can be recognized by
outcomes and actions.
• The attacks of 9/11 led to the creation of the Department
of Homeland Security (DHS); 22 separate departments
merged into one agency.
• The new position of Secretary of DHS would come with
great political power:
• Appointing responsibilities
• Directing funds and resources
• Implementing personnel policy
• Oversight
• Creation of DHS led to issues within Congress and other
parts of the federal government:
• Committee Chairs did not want to give up their powers.
• If one committee exercised power, it was resisted by other ones.
• Funds were misappropriated across different agencies nationwide.
• Richard Clarke, author of “National Plan to Secure Cyberspace”
was forced to resign.
• Between 2003-2005, there was no real cyber security strategy;
lack of leadership and “turf wars” kept cyber security czars from
developing cyber security strategies.
• Major cyber security breaches in 2007 and 2008 affected State
Dept., DoD, DHS, NASA and the VA.
• These breaches prompted directives HSPD 23 and
NSPD 54 that led to Comprehensive National
CyberSecurity Inititative (CNCI) and the National Cyber
Security Center (NCSC).
• The NSA wanted to be in charge of cyber security.
• In 2009, Obama promised to develop a national cyber
security policy and appoint a federal cyber security
coordinator.
• This position would be above NSA and DHS and
depends on the collaboration between different
organizations.
• According to Dhillon (2013), “episodic power
relationships played a crucial part in the first decade of
• A month after 9/11, Senator Lieberman introduced a bill
to establish a DHS that had aspects of cyber security:
• Maintaining a hub of cyber security experts
• Sharing of information concerning cyber security in the U.S.
• Establishing cyber security standards with the FCC
• Certifying national preparedness for cyber attacks
• After DHS was created, cyber security matters took a low
priority
• DHS officials and loyalists to Bush, did not criticize its
lacking cyber security initiatives as most of the country
supported the government’s national security endeavors
unquestionably.
• System integration has two subcomponents:
• Production
• Discipline
• The Cyber Security Enhancement Act (CSEA) of 2002
grants companies permission to release customers’
electronic info to government employees without
warrants or legal documents.
• Reports were exempt from Freedom of Information Act requests
• Companies providing info were free from being sued by customers
• Customers did not have to be notified that their info was released
• Stop Online Piracy Act (SOPA) of 2012 was met with a
huge public backlash; major internet companies opposed
SOPA.
• Cyber security policy was drastically affected by:
• Turf wars
• Executive orders
• Legislative procedures
• Patriotic culture
• Public backlash
• Major shifts in power within the federal government
• Obama’s 2013 executive order to put cyber security
policy into law will design a framework for the
government and the private sector to “allow intelligence
to be gathered on cyber threats to privately owned critical
infrastructure…so they can better protect themselves”
(Dhillon, 2013, p. 202).

Contenu connexe

Tendances

Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
Abegail Roberts
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
DeniseMitchell
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
 

Tendances (20)

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Cybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil SocietyCybersecurity: Increased Transparency and the Role of Civil Society
Cybersecurity: Increased Transparency and the Role of Civil Society
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Digital security act (DSA)
Digital security act (DSA)Digital security act (DSA)
Digital security act (DSA)
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 
Data Sovereignty
Data SovereigntyData Sovereignty
Data Sovereignty
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
Immigration enforcement in the united states
Immigration enforcement in the united statesImmigration enforcement in the united states
Immigration enforcement in the united states
 
Digital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in BangladeshDigital Security Act (DSA) 2018 in Bangladesh
Digital Security Act (DSA) 2018 in Bangladesh
 
Otieno antony rethinking internet shutdown
Otieno antony   rethinking internet shutdownOtieno antony   rethinking internet shutdown
Otieno antony rethinking internet shutdown
 
Governance and Information Technology
Governance and Information TechnologyGovernance and Information Technology
Governance and Information Technology
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 
Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 

Similaire à CT3- STEVENS

A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
Scott Dickson
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
gertrudebellgrove
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 

Similaire à CT3- STEVENS (20)

Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
CST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity PolicyCST 20363 Session 6 Cybersecurity Policy
CST 20363 Session 6 Cybersecurity Policy
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Module II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptxModule II Week 6 Lesson 12.pptx
Module II Week 6 Lesson 12.pptx
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
U.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity GovernanceU.S. Approach to Cybersecurity Governance
U.S. Approach to Cybersecurity Governance
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
Comprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final ReportComprehensive U.S. Cyber Framework Final Report
Comprehensive U.S. Cyber Framework Final Report
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

CT3- STEVENS

  • 1. Elizabeth Stevens Dr. Gurpreet Dhillon INFO – 644, CT3
  • 2. • Subramanian (2010) defines cyber security as: • “The security of a nation’s computer and telecommunications infrastructure as well as the data stored within the computers from outside attack” (Dhillon, 2013, p. 188). • Cyber security includes protection of: • Hardware • Software • Information in both public and private sectors • Military • Communications networks • Electrical grids • Power plants
  • 3. • The history of U.S. cyber security policy is examined through Clegg’s theory of circuits of power. • Circuits of power “explains power relationships independent of the particular circumstances of organizations or their structure. The application of the theory leads to a complete political appraisal of the organization” (Dhillon, 2013, p. 190). • Power circulates in three different circuits: • Episodic circuit • Social integration circuit • System integration circuit
  • 4. • Episodic power – describes the day-to-day interaction, work, and outcomes (p. 190); can be recognized by outcomes and actions. • The attacks of 9/11 led to the creation of the Department of Homeland Security (DHS); 22 separate departments merged into one agency. • The new position of Secretary of DHS would come with great political power: • Appointing responsibilities • Directing funds and resources • Implementing personnel policy • Oversight
  • 5. • Creation of DHS led to issues within Congress and other parts of the federal government: • Committee Chairs did not want to give up their powers. • If one committee exercised power, it was resisted by other ones. • Funds were misappropriated across different agencies nationwide. • Richard Clarke, author of “National Plan to Secure Cyberspace” was forced to resign. • Between 2003-2005, there was no real cyber security strategy; lack of leadership and “turf wars” kept cyber security czars from developing cyber security strategies. • Major cyber security breaches in 2007 and 2008 affected State Dept., DoD, DHS, NASA and the VA.
  • 6. • These breaches prompted directives HSPD 23 and NSPD 54 that led to Comprehensive National CyberSecurity Inititative (CNCI) and the National Cyber Security Center (NCSC). • The NSA wanted to be in charge of cyber security. • In 2009, Obama promised to develop a national cyber security policy and appoint a federal cyber security coordinator. • This position would be above NSA and DHS and depends on the collaboration between different organizations. • According to Dhillon (2013), “episodic power relationships played a crucial part in the first decade of
  • 7. • A month after 9/11, Senator Lieberman introduced a bill to establish a DHS that had aspects of cyber security: • Maintaining a hub of cyber security experts • Sharing of information concerning cyber security in the U.S. • Establishing cyber security standards with the FCC • Certifying national preparedness for cyber attacks • After DHS was created, cyber security matters took a low priority • DHS officials and loyalists to Bush, did not criticize its lacking cyber security initiatives as most of the country supported the government’s national security endeavors unquestionably.
  • 8. • System integration has two subcomponents: • Production • Discipline • The Cyber Security Enhancement Act (CSEA) of 2002 grants companies permission to release customers’ electronic info to government employees without warrants or legal documents. • Reports were exempt from Freedom of Information Act requests • Companies providing info were free from being sued by customers • Customers did not have to be notified that their info was released • Stop Online Piracy Act (SOPA) of 2012 was met with a huge public backlash; major internet companies opposed SOPA.
  • 9. • Cyber security policy was drastically affected by: • Turf wars • Executive orders • Legislative procedures • Patriotic culture • Public backlash • Major shifts in power within the federal government • Obama’s 2013 executive order to put cyber security policy into law will design a framework for the government and the private sector to “allow intelligence to be gathered on cyber threats to privately owned critical infrastructure…so they can better protect themselves” (Dhillon, 2013, p. 202).