In an effort to sustain cybersecurity preparedness, the following recommendations are presented for the current administration.
Education and Awareness: Coordinate public messages and outreach campaigns to educate and promote cybersecurity awareness. Research past campaigns from previous administration to see has worked in the past. Users are becoming more aware of potential risks (see Figure 2, User Security Awareness) however people’s security is a major concern.
Private-Public Partnership: Roles and responsibilities of each partnership must be defined, therefore can evolve based on each role. (United States Executive Office of the President, 2009). Each federal agency must examine current public relationship along with current roles; identify areas for communication improvement and partnering. Private-Public should partner to coordinate protocols for protection and incident response. Leverage interoperability between private-public agencies to enable efficient execution of operations. Internationally, bring about legal norms, technical standards, and like-minded thought processes to bring about open-ended dialogue. (United States Executive Office of the President, 2009).
Authentication Mandate: Ensure all online transactions are trustworthy, therefore come from a legislative mandate however executed in a way that doesn’t infringe upon legal privacy infractions. Baker notes, “The commission calls for verification of user integrity and credentials over transmitted messages for access to vital infrastructure. Consumers are permitted to use government-issued transactions as long as privacy and civil liberties stay intact and uncompromised.” (Baker, 2009, p. 92). Commercial operations would be managed separately, based on risk assessment, keeping internet traffic compartmentalized.
Revamp Procurement: The government holds the largest budget and is the largest consumer of information technology therefore cybersecurity policies should be written into acquisitions and appropriations.
Legal and Regulatory Review: The Federal Information and Security Management Act (FISMA) encompass economic and national security interests within the U.S. FISMA stipulates a risk-based policy with cost-effective security implementation measures. Regular metrics-based performance assessments should progress following policy enchantments. An overhaul on criminal investigation and prosecution for cybercrimes also is needed. (Baker, 2009).
Research demonstrates cybersecurity challenges aren’t technology related, but rather policy, behavioral, and legal. As noted, keeping open dialogue between government and the public sector is essential to maintain partnerships. There’s already a model in place, the key here is to build upon existing pedagogical strategies. Both the private and public must do their part to build partnering relationships therefore stimulating innovation, empowerment, and assurance while ensuring protection of civil...