Cybersecurity: Difference between revisions

From Cyberlaw: Difficult Issues Winter 2010
Jump to navigation Jump to search
(Comments do help sites flourish, especially w)
(i mostly dont agree)
Line 4: Line 4:
Comments do help sites flourish, especially w
Comments do help sites flourish, especially w


== NEXT STEPS ==
i mostly dont agree
 
Earlier this year, the White House released a [http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review] that recognizes the far-reaching impact of cybersecurity and the currently vulnerable position of the United States. The Near-Term and Mid-Term action plans from that report are reproduced below.
 
The most-discussed / most publicized step towards improving cybersecurity is to [http://www.msnbc.msn.com/id/32290186/ns/politics-white_house/ name a Cyber Czar].  Since Obama initially announced this intention in May, 2009, however, the position has continued to go unfilled. Some politicians support this move (see [http://www.fcw.com/Articles/2009/10/30/Web-Lieberman-Cybersecurity-Legislation.aspx Lieberman], but other experts are critical of this position - considering either unnecessary or actually counterproductive (see [http://www.wired.com/dangerroom/2009/08/white-house-cyber-czar-resigns-good-riddance/ Tanji] and [http://www.fcw.com/Articles/2009/11/02/Web-Collins-cybersecurity-coordinator-opposition.aspx Collins]).
 
Legislation on a variety of fronts is also being considered, though not everyone is sure what (if anything) the new legislation would add.<ref>[http://www.fcw.com/Articles/2009/05/04/news-congress-cybersecurity.aspx]Ben Bain, Lawmakers Attack Cybersecurity on Multiple Fronts, Federal Computer Week, May 1, 2009.</ref>
 
[[Image:Near_Term_Action_Plan.PNG|White House Cyber Security Review Near Term Action Plan]]
 
[[Image:Mid-Term_Action_Plan.PNG|White House Cyber Security Review Mid-Term Action Plan]]
<ref>[http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf White House Cyberspace Policy Review], p37-38 (March, 2009).</ref>


==REFERENCES==
==REFERENCES==
<references/>
<references/>

Revision as of 16:50, 15 August 2011

For the cybersecurity student group's discussions from the Cyberlaw: Difficult Problems Class, see Cybersecurity Brainstorming CQRory this is what i needed man

Comments do help sites flourish, especially w

i mostly dont agree

REFERENCES