|
|
| Line 4: |
Line 4: |
| Comments do help sites flourish, especially w | | Comments do help sites flourish, especially w |
|
| |
|
| == NEXT STEPS ==
| | i mostly dont agree |
| | |
| Earlier this year, the White House released a [http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review] that recognizes the far-reaching impact of cybersecurity and the currently vulnerable position of the United States. The Near-Term and Mid-Term action plans from that report are reproduced below.
| |
| | |
| The most-discussed / most publicized step towards improving cybersecurity is to [http://www.msnbc.msn.com/id/32290186/ns/politics-white_house/ name a Cyber Czar]. Since Obama initially announced this intention in May, 2009, however, the position has continued to go unfilled. Some politicians support this move (see [http://www.fcw.com/Articles/2009/10/30/Web-Lieberman-Cybersecurity-Legislation.aspx Lieberman], but other experts are critical of this position - considering either unnecessary or actually counterproductive (see [http://www.wired.com/dangerroom/2009/08/white-house-cyber-czar-resigns-good-riddance/ Tanji] and [http://www.fcw.com/Articles/2009/11/02/Web-Collins-cybersecurity-coordinator-opposition.aspx Collins]).
| |
| | |
| Legislation on a variety of fronts is also being considered, though not everyone is sure what (if anything) the new legislation would add.<ref>[http://www.fcw.com/Articles/2009/05/04/news-congress-cybersecurity.aspx]Ben Bain, Lawmakers Attack Cybersecurity on Multiple Fronts, Federal Computer Week, May 1, 2009.</ref>
| |
| | |
| [[Image:Near_Term_Action_Plan.PNG|White House Cyber Security Review Near Term Action Plan]]
| |
| | |
| [[Image:Mid-Term_Action_Plan.PNG|White House Cyber Security Review Mid-Term Action Plan]]
| |
| <ref>[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf White House Cyberspace Policy Review], p37-38 (March, 2009).</ref>
| |
|
| |
|
| ==REFERENCES== | | ==REFERENCES== |
| <references/> | | <references/> |
Revision as of 21:50, 15 August 2011
For the cybersecurity student group's discussions from the Cyberlaw: Difficult Problems Class, see Cybersecurity Brainstorming
CQRory this is what i needed man
Comments do help sites flourish, especially w
i mostly dont agree
REFERENCES