Presidential Approaches to Cybersecurity

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Philippine Cybercrime Efforts
U.S. Transition – Forming the Next Government 1. On November 4, 2008: The longest presidential campaign in U.S. history ended. A record 130 million Americans.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Brian Connett, LCDR, USN US NAVAL ACADEMY
The U.S. Coast Guard’s Role in Cybersecurity
Cyberterrorism. Critical Infrastructure Vulnerability.
 The Indispensable Component of Cyber Security: The Dynamics of an Effective Cyber Cooperation Prof. Nazife Baykal Director of METU Informatics Institute.
UNCLASSIFIED Shaping the Future of Cybersecurity Education October 2010 NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) Is N.I.C.E.
CIAO July Critical Infrastructure Assurance Office Protecting America’s Cyberspace: Version 1.0 of the National Plan Jeffrey Hunker National.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
The Loyalty-Competence Tradeoff. Why do presidents distrust the bureaucracy? Why do they face challenges running it? Is resistance from career bureaucrats.
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
2015 GLOBAL CYBERSECURITY STATUS REPORT Global Cybersecurity Status Report Companies and government organizations worldwide are focusing on cybersecurity.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
“Privacy Institutions in the Federal Government” Professor Peter Swire Ohio State University Center for American Progress Silicon Flatirons February 14,
Franca R. Jones Senior Policy Analyst Chemical and Biological Countermeasures National Security and International Affairs Remarks for the Interagency Board.
United States Coast Guard Port Security Assessment Program Evaluability Assessment LaKeshia Allen Alexandra Sommers May 2, 2005.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Japanese Government’s Efforts to Address Information Security Issues October, 2007 National Information Security Center (NISC)
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Digital Security Kristin Fedora October 5, Digital Security Def: The precautions that all technology users must take to guarantee their personal.
The Homeland Security Act of 2002 During the second session of the 107th Congress, the primary focus was on how best to tackle the development of a viable,
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
PS Version 1 National Response Framework Overview for Private Sector Audiences January 22, 2008.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Pearson Education, Inc. © 2005 Chapter 13 THE FEDERAL BUREAUCRACY.
Warm-up List 5 things that Bill Clinton did while he was President. 1.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
1Office of the Federal Coordinator for Meteorology OFCM OFCM Special Session: Uncertainty in Atmospheric Transport and Diffusion (ATD) Models Setting the.
Law Seminars International Spectrum Management Conference NTIA: SPECTRUM POLICY FOR THE 21 st CENTURY The Federal Government Spectrum Management Perspective.
Homeland Security and Emergency Management Discussion U.S. Department of Homeland Security  National Preparedness Directorate, FEMA Higher Education Conference.
Smart City Hacked??? Technology & Society. American cities vulnerable to large-scale cyber attack
1 Office of Travel & Tourism Industries, International Trade Administration, U.S. Department of Commerce Organization of American States XXI Inter-American.
SWBAT: Explain post-Cold War U.S. foreign policy (interventionist) & efforts to end terrorism FOREIGN POLICY POST-COLD WAR.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Newly Released State Department Report Is Highly Critical of Hillary Clinton’s Private Usage CLINTON REPORT May 26, 2016 | Ben Booker Sources:
RCUK cross-Council research themes - an overview.
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Cyber Security and Georgia. New Challenges
Nation State Actors Lex Dunlap.
Cybersecurity in the United States
Enterprise risk management
INFORMATION SECURITY IN ARMENIA: PRESENT STATUS AND TASKS
The New Military-Industrial Complex?
U. S. Department of Homeland Security. Office for Civil Rights
America’s First National Critical Infrastructure Exercise
Copyright © 2012, Elsevier Inc. All rights Reserved.
CIPC Relationships & Roles
Computers and Homeland Security
Into A New Century – 12 words
Transit Security Training and Education Overview
The Democrats' Most Effective Midterm Message: Outsourcing
Confronting Cyber Threats: Cybersecurity from the FBI’s Perspective
Securing Critical Chemical Assets: The Responsible Care® Security Code
Vladimir PUTIN President
United States History II The Dawn of the 21st Century
Homeland Security Program School of Health, Science & Criminal Justice Fall 2015 Assessment Report
SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W. Bush, and Obama administrations.
NRC Security Systems and Principles Course
The Democrats' Most Effective Midterm Message: Outsourcing
Presentation transcript:

Presidential Approaches to Cybersecurity Comparisons and Predictions of America’s Approach to National Security

Importance “Cyber Terrorism could also become more attractive as the real and virtual worlds become more closely coupled” -Dorothy E. Denning Professor in the Defense Analysis Department at the Naval Postgraduate School

Issues With the constant advancement and increased reliance on technology it is hard to combat cyber attacks because hackers evolve alongside technology.

The Bush Administration

"Securing cyberspace is an extraordinarily difficult strategic challenge that requires a coordinated and focused effort from our entire society--the federal government, state and local government, the private sector and the American people," -President Bush

Policy & Department development Department of Homeland Security Executive Order 13231, President’s Critical Infrastructure Protection Board Cybersecurity Research and Development Act (2002) National Strategy to Secure Cyberspace (2003) Comprehensive National Cybersecurity Initiative (2008)

Major Attacks September 11 attacks on the World Trade Center Cyber Storms (2006)

The Obama Administration

“So shortly after I took office, before I had gray hair, I said that these cyber threats were one of the most serious economic national security challenges that we face as a nation, and I made confronting them a priority.” - President Obama

Policy & department development Cyberspace Policy Review (2009) Declassified Bush’s CNCI (2010) U.S. Cyber Command (2010) Cyber Information Sharing Act (2015)

Major attacks Stuxnet Worm Chinese Hacking Syndicates WikiLeaks Edward Snowden

The Trump Administration

"In a little while, I'd like to address one of the most important aspects of America's national security, and that's cyber security. To truly make America safe, we must make cyber security a major priority, which I don't believe we're doing right now, for both government and the private sector." -President Trump

Pre-Presidential In the late stages of the election, it was proven that Vladimir Putin, Russian President, aimed a cyberattack on democratic party institutions in an attempt to weaken Clinton’s chance at the presidency.

Policy President Trump had scheduled to release an executive order regarding cybersecurity by the end of January The order would have had the cybersecurity departments model their practices after the private sector, however the order was postponed Trump tweeted that a full report would be out within 90 days however it has yet to be released

Common Themes

Sources http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26_4.html http://www.cybersecurityhalloffame.com/content/timeline/Cyber-Security-Cyber-Security-Timeline https://www.usnews.com/topics/subjects/cybersecurity https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-cybersecurity-national-action-plan https://www.dhs.gov/cybersecurity-overview https://www.us-cert.gov/about-us https://www.washingtonpost.com/world/national-security/chinese-hackers-breach-federal-governments-personnel-office/2015/06/04/889c0e52- 0af7-11e5-95fd-d580f1c5d44e_story.html?utm_term=.1440478a83cf http://www.reuters.com/article/us-usa-cybersecurity-rankings-idUSKCN0XB27K https://www.dhs.gov/cyber-safety http://abcnews.go.com/Technology/story?id=4457451&page=1 https://www.cnet.com/news/bush-unveils-final-cybersecurity-plan/ http://www.foxnews.com/us/2017/03/07/wikileaks-releases-entire-hacking-capacity-cia.html https://wikileaks.org/ https://www.nytimes.com/2016/06/21/us/politics/china-us-cyber-spying.html?_r=0 http://www.cbsnews.com/news/trump-cybersecurity-executive-order/ http://www.politico.com/story/2017/04/20/trump-cybersecurity-hackers-237385 http://www.economist.com/blogs/analects/2013/02/chinese-cyber-attacks https://georgewbush-whitehouse.archives.gov/infocus/bushrecord/documents/Policies_of_the_Bush_Administration.pdf http://thehill.com/policy/technology/84513-declassified-wh-cybersecurity-report-specifie