Cybersecurity Strategy, Law, and Policy (Group 5).pdf - The Cybersecurity Threat Landscape Group Assignment By Crispin Sillah Kelving Matos Saurabh

Cybersecurity Strategy, Law, and Policy (Group 5).pdf - The...

This preview shows page 1 - 7 out of 23 pages.

The Cybersecurity Threat Landscape Group Assignment By: Crispin Sillah, Kelving Matos, Saurabh Roy-Chowdhury, Garry Reese and Ayodeji Oyekunle University of Maryland Global Campus CMIT 495: Current Trends and Projects in Computer Networks and Security Instructor: Prof. Obiora Ndubuisi Date: 10 May 2020
Image of page 1
Cybersecurity Threat Landscape 2 Table of Contents Part 1: National Security Strategy and Cybersecurity .............................................................. 3 Part 2: Public/Private Partnerships ............................................................................................ 6 Part 3: Private Sector Organizations ........................................................................................ 10 Part 4: Protecting Critical Infrastructure and the Homeland ................................................ 12 Part 5: Cybersecurity Technologies .......................................................................................... 16 Conclusion ................................................................................................................................... 21 References .................................................................................................................................... 22
Image of page 2
Cybersecurity Threat Landscape 3 Part 1: National Security Strategy and Cybersecurity Should the United States create a separate cybersecurity strategy to be published alongside the National Security Strategy (NSS), or do you feel the NSS is sufficient? Historically wars were fought on land or on the land domain. As civilizations and technologies evolved man made naval vessels meant now wars could be fought on the sea domain. Thanks to the Wright brothers we entered the air domain as well. In the last 30 years or so another new domain has emerged, the Cyber domain. Cyberspace controls more than just computers. NIST.gov defines cyberspace as “A global domain within the information environment consisting of the interdependent network of information systems infrastructures including the Internet, telecommunications networks, computer systems, and embedded processors and controllers” (COMPUTER SECURITY RESOURCE CENTER, n.d.). While the National Security Strategy briefly mentions Cybersecurity and the importance of protecting the United States in this domain it lacks details. This is where our team feels that a separate, detailed National Cybersecurity strategy needs to exist on top of the National Security Strategy. The National Security Strategy lacks priorities as mentioned in the National Strategy to secure Cyberspace (2003): (/content/enforced/445503-026981-01-2202-OL4-7985/2003%20NSSC.pdf, n.d.)
Image of page 3
Cybersecurity Threat Landscape 4 Some of the key components of an effective Cybersecurity Strategy are highlighted below (NATIONAL CYBER STRATEGY, n.d.):
Image of page 4
Cybersecurity Threat Landscape 5
Image of page 5
Cybersecurity Threat Landscape 6 Part 2: Public/Private Partnerships Address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the Act. The Department of Homeland in the United States is responsible for protecting the Nation’s critical infrastructure such as transportation, power grids, health sector, agricultural sector, and so on, from physical and cyber threats. Protecting these systems and sectors are essential for economic growth and national security. According to Cybersecurity Information Sharing Act of 2015 (CISA) (Ringe, 2020) is expected to set the parameters for how federal departments and agencies, and non-federal entities – tribal, local, and state government share and receive cybersecurity-related information. The National Cybersecurity and Communications Integration
Image of page 6
Image of page 7

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture