Cyberterrorism, is an explosive and heavily volatile act that threatens the very fabric of networking operations of their intended target/s, and guess what, the United States “cyberspace” platform has provided a means of accessing our most secretive, sensitive, including, military tactical operations data. Successful attacks upon the US networking infrastructure would obviously impede governmental operation, more importantly; accessing a wealth of potentially destructive information would have profound implications, thus, Cybersecurity policies must be implemented. Cybersecurity policies create levels and barriers of networking security as their standards, guidelines, and response to potential threats, vulnerabilities, and consequential risk are greatly reduced.
Encompassing the security of “Cyberspace” is an extensive range of threat prevention and reduction techniques designed to thwart attackers from accessing the networking infrastructure. Cyberspace by definition is a platform in which communication through technology occurs. Thwarted with dangers that pose extreme risk, Cyberspace has become the premier criminal activity platform due to its perpetual anonymity resulting in the harm to another entities technology, commuters/servers, as well as storage databases. This policy proposal shall minimize vulnerability, increase prevention and deterrence while providing incident response standards and practices including perpetrator accountability (House, 2014).
Section I: Description of Policy
This “Cybersecurity” Policy sets forth the written rule and regulation of the .gov domain networking infrastructure conduct, network security disciplines, as well as type of threats, risks, and vulnerabilities in which investigation, arrest, and prosecution may be imposed in accordance with federal, state, and local laws. In addition to these ethics and code of conduct, it is recommended that all state jurisdictions implement the following framework as the bases to build upon within their localities. Securing “Cyberspace” (.gov domain) from becoming another statistical victim of “Cyberterrorism”, all implementations must be compliant with federal, state, and local laws, depending on jurisdiction, as well as adhering to all national standards of technology.
This policy is also in compliance with federal statues such as the following:
• Cyber Intelligence Sharing and Protection Act (H.R. 624), which focuses on information sharing and coordination, including sharing of classified information;
• Cybersecurity Enhancement Act of 2013 (H.R. 756), which addresses federal cybersecurity R&D and the development of technical standards;
• Advancing America’s Networking and Information Technology Research and Development Act of 2013 (H.R. 967), which addresses R&D in networking and information technology, including but not limited to security; and
• Federal Information Security Amendments Act of 2012 (H.R. 1163), which addresses FISMA...