Institutional structure: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
mNo edit summary |
||
Line 1: | Line 1: | ||
= Introduction = | |||
= Status Quo = | |||
The government structures for responding to cyber-threats are complex, with a number of agencies sharing authority in occasionally overlapping areas. | The government structures for responding to cyber-threats are complex, with a number of agencies sharing authority in occasionally overlapping areas. | ||
Line 8: | Line 8: | ||
This chart, while by no means an exhaustive survey of government action in the realm of cybercrime and cyberwar, attempts to plot several of the major actors in those areas as well as the main ways in which those actors are linked together. | This chart, while by no means an exhaustive survey of government action in the realm of cybercrime and cyberwar, attempts to plot several of the major actors in those areas as well as the main ways in which those actors are linked together. | ||
= Actors = | == Actors == | ||
Various government and private actors participate in preventing, detecting, and responding to various cyber-threats. Broadly speaking, these actors fall into four different categories: | Various government and private actors participate in preventing, detecting, and responding to various cyber-threats. Broadly speaking, these actors fall into four different categories: | ||
Line 16: | Line 16: | ||
* Private corporations | * Private corporations | ||
= Links = | == Links == | ||
* Structural | * Structural | ||
Line 23: | Line 23: | ||
* De facto cooperation | * De facto cooperation | ||
= Centralization vs. Decentralization = | |||
= Top-down vs. Bottom-up Institutional Response = |
Revision as of 18:10, 18 December 2010
Introduction
Status Quo
The government structures for responding to cyber-threats are complex, with a number of agencies sharing authority in occasionally overlapping areas.
CHART
This chart, while by no means an exhaustive survey of government action in the realm of cybercrime and cyberwar, attempts to plot several of the major actors in those areas as well as the main ways in which those actors are linked together.
Actors
Various government and private actors participate in preventing, detecting, and responding to various cyber-threats. Broadly speaking, these actors fall into four different categories:
- Cyber-specific federal agencies (e.g. Cyber Command)
- Defense and investigation agencies (e.g. Department of Defense, FBI, CIA, NSA)
- Independent agencies with relevant concerns and vulnerabilities (e.g. Department of State, Federal Communications Commission)
- Private corporations
Links
- Structural
- Statutory
- Negotiated cooperation
- De facto cooperation