Homeland Security Policy on Intelligence Sharing and Education (Essay Sample)
A policy paper on intelligence sharing. The instructions required writers to come up with a policy proposal that can help solve the challenge of cyber security especially during sport events.source..
Policy Paper on Intelligence
Homeland Security Policy on Intelligence Sharing and Education
Government agencies and the people in private sectors have been experiencing instances of cyber threats from all corners of the world because of their over-reliance on technology. Recognizing that both the private sector and the government lack a robust and transparent understanding on how they can overcome the challenges of cybersecurity, the Homeland security introduced a bill on cyber-preparedness Act, and it was later passed in the Congress. Within the law, section two offers an opportunity for the businesses and government to work collaboratively by sharing vital information that could jeopardize both areas. The sharing of intelligence between these actors has in the recent past been a problem with the establishment of fusion centers that could help in mitigating the challenges. One of the most significant challenges is that there is mistrust between both sectors and this is facilitated by colossal knowledge gap between experts in the companies and the community they work for as well as the government. In this regard, it is vital for fusion centers such as the National Cybersecurity and Communications Integration Centre currently known as a cyber center to bridge the gap under the stipulations of the HR 584 through progressive learning programs on the benefits of sharing intellectual knowledge.
The current policy on cybersecurity is the H.R. 584 which has provisions for homeland security intelligence sharing with the private sector (Congress.gov, 2017). The sharing is concluded to be a one-way affair because the policy does not show a link where homeland can share its intelligence with the private sector. Among other things the plan provides for is the “coordination with national cybersecurity and communications integration center access to timely technical assistance, risk management support and incident response capabilities concerning cyber threat indicators. Also, coordination of defensive measures and cybersecurity risks, incidents, mitigation and provision of information and recommendations on security and resilience” (Congress.gov, 2017). Before it became an act the bill was proposed by Republican Dan Donovan (Homeland Security, 2017). One of the most significant fears that the private sector such as banking and financial institutions are faced with is the risk that the information released to the government under Homeland Security may be discharged through public records requests, and may even result into forfeiting of individual intellectual property rights(Nolan, 2015). Moreover, some of them fear that the information may be used against the private sector in a subsequent regulatory action and more importantly the privacy of the executives whose data have been disclosed in the cyber-intelligence (Nolan, 2015). The only way out is for the Homeland Security's National Cyber Security Division (NCSD) to work collaboratively with NCCIC into introducing educational programs that can be shared with the private sector on ways in which their partnership can enhance their security and that of the nation (Kajankoski, 2015). Before that, they should ensure them of their intellectual rights protection and that of their s
- An Essay About Possible Alternatives To IncarcerationDescription: Recent studies point out that almost two million youngsters go through juvenile courts in the United States annually....4 pages/≈1100 words| 2 Sources | APA | Law | Essay |
- The Case of Diane Pretty before the European Court of Human RightsDescription: The main task was to give my own opinion regarding a court case specifically the case Diane Pretty before the European Court of Human Rights...3 pages/≈825 words| 3 Sources | APA | Law | Essay |
- Discuss the Different Phases of Incident Response CycleDescription: An incident response cycle entails phases in which security breach or attack is addressed and managed in a given organization through a step-to-step process...1 page/≈275 words| 2 Sources | APA | Law | Essay |