Getting cybersecurity right

Johnson, Ron
March 2012
Hill;3/27/2012, Vol. 19 Issue 39, p20
The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.


Related Articles

  • Cyberwarfare challenge.  // Nature;6/9/2011, Vol. 474 Issue 7350, p127 

    The author reflects on cyberwarfare, which serves as a challenge to governments. The author states that since a cyber arms race is expected, the Pentagon would likely issue a report that will describe the potential response of the U.S. government to a cyberattack. The author says that Great...

  • La cyberstratégie de l'Union Européenne. KEMPF, Olivier // Sécurité Globale;ete2013, Issue 22, p25 

    Publication the cybersecurity strategy of the European Union, on February 7, 2013, is the first public statement of an autonomous European e-strategy. This is an important step that deserves attention. The text has the merit of addressing lucidly an area where the EU was clearly down. The text...

  • U.S. International Policy for Cybersecurity: Five Issues That Won't Go Away. Coldebella, Gus P.; White, Brian M. // Journal of National Security Law & Policy;2010, Vol. 4 Issue 1, p197 

    The article discusses the five issues faced by the U.S. international policy for cybersecurity. These five issues include the need to improve the governance structure for the Internet, building norms for cyber behavior, and expansion of multilateral cooperation against cyber crime, outlining an...

  • THE ACQUISITION SUPPLY CHAIN AND THE SECURITY OF GOVERNMENT INFORMATION TECHNOLOGY PURCHASES. Morrison, Michael Ian // Public Contract Law Journal;Summer2013, Vol. 42 Issue 4, p749 

    In this article, the author offers information related to information technology threats and cyber attack on the U.S. and different policies and regulations of the country for prevention of these threats. He further discusses the Cybersecurity Act of 2012 and the Cybersecurity Executive Order...

  • A Comparative Study of the Information Security Policies of Japan and the United States. Hunker, Jeffrey // Journal of National Security Law & Policy;2010, Vol. 4 Issue 1, p217 

    The article compares the information security policies and institutions of Japan and the U.S. It discusses the cybersecurity system in Japan and examines the type of information security policy including cryptography policy in the country. The article also analyzes the anti-bot policy. It...

  • Foundational Questions Regarding the Federal Role in Cybersecurity. Yamada, Yasuhide; Yamagishi, Atsuhiro; Katsumi, Ben T. // Journal of National Security Law & Policy;2010, Vol. 4 Issue 1, p233 

    The article addresses the issues regarding federal role in cybersecurity in the U.S. It cites the attempt of the U.S. Department of Homeland Security (DHS) to implement Homeland Security Presidential Directive 23/National Security Presidential Directive 54 (HSPD 23/NSPD 54). It questions what...

  • Authorities boost cyber defences.  // Journal of Turkish Weekly;6/2/2014, p2 

    The article discusses the Turkish government's efforts in strengthening cyber security within the country as of June 2, 2014. Topics include the lack of awareness and well-trained professionals in cyber technology in Turkey, the Turkish military's Cyber Warfare Command which monitors its...

  • The Pentagon's Strategy for Cyberwar. Weitz, Richard // WPR Subset;6/ 7/2011, p1 

    The article focuses on the cybersecurity strategy being finalized by the U.S. Department of Defense, following a series of information leaks. It states that the strategy reflects an effort to comply with an order from the administration of the U.S. President Barack Obama to develop policies in...

  • Directive on Critical Infrastructure Security and Resilience.  // Daily Compilation of Presidential Documents;2/12/2013, p1 

    The article discusses the Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience that would strengthen and maintain secure, functioning and resilient critical infrastructure in the U.S. The directive clarifies the critical infrastrucure-related functions, roles...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics