The nation has become dependent on technology, furthermore, cyberspace. It is embedded in everything we provide in our daily lives, our phones, the Internet, communication, shopping, entertainment, flying airplanes, launching missiles, operating nuclear facilities, and by implication, protecting ourselves. The more ever-growing technology empowers Americans, the more they fall prey to cyber threats. The Executive Office of the President of the United States said: “The President has identified cybersecurity as one of his administration's top priorities and, in doing so, directed a 60-day review to evaluate policies.” (Executive Office of the President of the United States, 2009, p.2). Additionally, critical infrastructure, our network, and the Internet are identified as national assets upon which the Administration will orchestrate integrated privacy-free cybersecurity policies. As we protect our infrastructure, personal privacy and civil liberties, we must keep in mind that the private sector owns and operates the majority of our critical and digital infrastructure. People want the freedom and power to use technology, while being protected from harmful actions. Protection begins with awareness and education, the government must define empirical objectives based on the successes of previous campaigns. President Obama noted, “The government is providing Americans with unprecedented transparency and accountability as they participate in their democracy.” (Obama, 2009). Administration Key Cybersecurity Policies Unequivocally speaking, the threat of a cyber attack has become one of the most critical homeland and national security challenges we face as a nation today. Infrastructure to support government operations is… half of the paper… ama, B. (2009, May). Presidential Remarks on Protecting Our Nation's Information Technology Infrastructure (President). Conducted in the East Room of the White House, Washington, DC. Retrieved from http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-InfrastructureNational Institute of Standards and Technology. (2012, March/April). Base cybersecurity training on user perceptions. (IEEE Report 1540-7993/12). (pages 40-49). Retrieved from the University College IEEE Computer Society of the University of Maryland website: http://www.computer.org.ezproxy.umuc.edu/portal/web/csdlExecutive Office of the President of the United States. (2009). Cyberspace Policy Review: Ensuring a Reliable and Resilient Information and Communications Infrastructure. (pages 1-38). Retrieved from http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
tags