CYBERSPACE POLICY: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed

Powner, David A.
October 2010
GAO Reports;10/6/2010, preceding p1
Government Document
The article presents a study on cyberspace policy conducted by the U.S. Government Accountability Office (GAO). It reports that the policy has been reviewed to deal with the threats of cyber attacks in the systems and operations of the U.S. federal government. It suggests that the National Security Council with its Cybersecurity Coordinator lacks key planning strategy and needs to assign roles and responsibilities.


Related Articles

  • Cyberattacks on US explode 680 percent. Sasso, Brendan // Hill;4/26/2012, Vol. 19 Issue 52, p12 

    The article reports an official from the U.S. Government Accountability Office (GAO) testified that cyberattacks on the federal goverument soared 680 percent in five years.

  • GAO REPORT AGAIN HIGHLIGHTS EW LEADERSHIP GAP. Haystead, J.; Knowles, John // Journal of Electronic Defense;Aug2012, Vol. 35 Issue 8, p22 

    The article discusses a report released by the U.S. Government Accountability Office (GAO) in July 2012 on electronic warfare (EW). The overall approach of the Department of Defense to governing EW and the relationship between EW and cyberspace operations were examined by the report. The...

  • Untitled. Ashford, Warwick // Computer Weekly;3/16/2010, p25 

    The article focuses on a report on the Comprehensive National Cybersecurity Initiative (CNCI), which has found that lack of clear definitions of the roles of the government agencies involved in the initiative is hampering the U.S. cybersecurity defences. According to the reports by the U.S....

  • GAO Cites Challenges In DoD Cyber Activities. Biesecker, Calvin // Defense Daily;7/25/2011, Vol. 251 Issue 17, p6 

    The article offers information on a report by the U.S. Government Accountability Office (GAO), according to which the U.S. Defense Department (DoD) hasn't completed a comprehensive assessment for closing its cyber vulnerabilities. GAO states the measures of DoD to combat cyber threat including,...

  • Cyber Threats Facilitate Ability to Commit Economic Espionage. Wilshusen, Gregory C. // GAO Reports;6/28/2012, preceding p1 

    The article reports on the recommendations by the U.S. Government Accountability Office (GAO) on the threat of economic espionage due to increasing cyber threats. It mentions that the major sources for the cyber threats are hackers, criminal groups, political activism and others. The GAO has...

  • THE NEXT PLAYGROUND FOR HACKERS? KHALIFA, DAISY R. // Sea Power;Nov2014, Vol. 57 Issue 9, p12 

    The article focuses on security vulnerabilities and risk of cyber attacks seaports and maritime facilities in the U.S. Topics discussed include warning from the International Chamber of Commerce's International Maritime Bureau (IMB) regarding the threat; the report "Maritime Critical Infra...

  • THE ART OF CYBER WAR. Cunningham, Jeffrey M. // NACD Directorship;May/Jun2013, Vol. 39 Issue 3, p26 

    The article explores the cyberwarfare initiatives of China. Cybersecurity consultant Mandiant classified the building at Datong Road in Pudong, Shanghai as APT1 or advanced persistent threat number one after the U.S. found that the workers at the building are armed with advanced Internet...

  • Threats Impacting the Nation.  // GAO Reports;4/24/2012, preceding p1 

    The article presents the U.S. Government Accountability Office (GAO)'s report on cyber security. According to the GAO, cyber attack can have devastating impact on federal and nonfederal systems, disrupting the operations of governments and businesses and the lives of private individuals. It also...

  • CYBERSECURITY: Continued Efforts Are Needed to Protect Information Systems from Evolving Threats. Wilshusen, Gregory C.; Powner, David A. // GAO Reports;11/17/2009, preceding p1 

    The article highlights the study conducted by the U.S. Government Accountability Office (GAO) concerning the need to protect information systems from the evolving threats in the country. It identifies the cyber threats to the systems as well as the cyber-based critical infrastructures. It also...


Read the Article

Other Topics