75%(146)110 out of 146 people found this document helpful
This preview shows page 6 - 8 out of 8 pages.
II.Cybersecurity Act of 2015 Analysisa.)Address the private / public partnership with the DHS NCCIC Arguably the most important aspect of the Act.
CYBERSECURITY STRATEGY, LAW AND POLICY7b.)The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information. What should the DHS NCCIC (public) share with private sector organizations?c.)What type of threat information would enable private organizations to better secure their networks and what should private organizations share with the NCCIC?d.)As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers’ private data?e.)The government is not allowed to collect data on citizens. How should the Act be updated in 2018 to make it better and more value-added for the public-private partnership in regards to cybersecurity?III.General Data Protection Regulation (GDPR) by the EU Analysisa.)As a private sector organization do you believe that an equivalent to GDPR should or should not be implemented in the United States?IV.Department of Defense (DoD) Cyber Strategy Analysisa.)Cyber Strategy discusses the protection of critical infrastructure and the homeland.What does that mean to private organizations such as yourself?b.)If the majority of critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?c.)As a private organization, would you feel comfortable giving information that may contain your customers’ private data to the DoD?d.)Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?V.Blockchain Analysis and Proposala.)What would be your recommendation for how the NSS should incorporate this technology to the public? Propose exactly what you believe should be written in the NSS.b.)Specifically, explain the blockchain technology in layman terms to non-technical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions.
CYBERSECURITY STRATEGY, LAW AND POLICY8c.)Discuss what, if any policies or laws should be established to mandate its use in specific industries.ReferencesCordeman, A. H. (2018, June 27). President Trump's New National Security Strategy. Retrieved July 3, 2018, from -national-security-strategyNCO NITRD. (2003, February). National Strategy to Secure Cyberspace 2003. Retrieved July 5, 2018, from