Current Administration's Cybersecurity Policy

Read Complete Research Material



Current Administration's Cybersecurity Policy

Introduction3

Discussion4

Current Administration's Key Cyber Security Tenets5

Cyber Security Policies of Current Administration7

How the Current Administration's Cyber Security Policies Differs from the Previous Administration's Approach?8

Recommendations for Improving Current Administration's Cyber Security Policies10

Recommendation 1: National Discussion Regarding Cyber Security must Transcend Special Interest and Sensationalism11

Recommendation 2: There must be significant Accountability for the Security of Cyber Space11

Conclusion12

References13

Current Administration's Cybersecurity Policy

Introduction

Technological development has brought several changes, innovations and advancements in every field of life. Technological development has offered a wide range of potential resources and opportunities to businesses of all sizes. This may greatly help organizations in enhancing and improving their efficiency, as well as the productivity of their business. Therefore, these technologies may greatly impact the performance as well as the integrity of organizational processes (Cavelty, 2007). On the other hand, these technological developments may also influence the security of the organizational information. It is because of the reason that, technological development may also bring unpredictable and highly disastrous threats, regarding security of their information. In this cyber security may play a vital role in protecting the integrity of organizational processes (Theohary & Rollins, 2009). Cyber security is referred as the security of the information. It is often observed that, cyber security focuses on securing data, programs, networks and computers from destruction, change and unauthorized or unintended access. In addition to this, cyber security may include various processes and technologies which are designed to secure data, networks and computers from attacks, unauthorized and risks and vulnerabilities, which are delivered by cyber criminals through internet. The proceeding paper incorporates the current administration's key cyber security tenets in U.S. (Shetty, et.al., 2010). This may greatly help in understanding the current cyber security situation in U.S. Furthermore, the paper also describes the cyber security policies of the current administration of U.S. This study also incorporates the idea that, how the current administration's policy differs from the previous administration's approach. Some recommendations will also be provided in the study. These recommendations may help current administration in improving and enhancing their cyber security policies (Stone, 2010).

Discussion

In the current era of technology, governmental and non-governmental organizations are greatly emphasizing on the implementation of technology within their working environment. It is due to reason that, technological implementation may greatly help them in automating their work processes while ensuring the integrity of their business operations. On the other hand, these organizations may also face several issues regarding the security and integrity of their confidential information (Anonymous, 2013). It is because of the reason that, hospitals, financial institutions, corporations, military and governmental organizations store, process and collect a wide range of confidential information on their networks and computer systems. In this scenario, the information is usually at high risk of exposure, disclosure or unauthorized access. These risks and vulnerabilities may greatly affect the reputation as well as the work operations of the business. It is also observed that, information technologies exist at the heart of U.S. economic, social and military activities, and offer tremendous advantages in all these areas ...