Aux armes, citoyens: Cyber security and regulation in the United States

2005 ◽  
Vol 29 (11) ◽  
pp. 821-830 ◽  
Author(s):  
James Andrew Lewis
Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


Author(s):  
Steven A. Arndt

Over the past 20 years, the nuclear power industry in the United States (U.S.) has been slowly replacing old, obsolete, and difficult-to-maintain analog technology for its nuclear power plant protection, control, and instrumentation systems with digital systems. The advantages of digital technology, including more accurate and stable measurements and the ability to improve diagnostics capability and system reliability, have led to an ever increasing move to complete these upgrades. Because of the difficulties with establishing digital systems safety based on analysis or tests, the safety demonstration for these systems relies heavily on establishing the quality of the design and development of the hardware and software. In the United States, the U.S. Nuclear Regulatory Commission (NRC) has established detailed guidelines for establishing and documenting an appropriate safety demonstration for digital systems in NUREG-0800, “Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants: LWR Edition,” Chapter 7, “Instrumentation and Controls,” Revision 5, issued March 2007 [1], and in a number of regulatory guides and interim staff guidance documents. However, despite the fact that the United States has a well-defined review process, a number of significant challenges associated with the design, licensing, and implementation of upgrades to digital systems for U.S. plants have emerged. Among these challenges have been problems with the quality of the systems and the supporting software verification and validation (V&V) processes, challenges with determining the optimum balance between the enhanced capabilities for the new systems and the desire to maintain system simplicity, challenges with cyber security, and challenges with developing the information needed to support the review of new systems for regulatory compliance.


Author(s):  
Rosemary A. Burk ◽  
Jan Kallberg

AbstractCyber security tends to only address the technical aspects of the information systems. The lack of considerations for environmental long-range implications of failed cyber security planning and measures, especially in the protection of critical infrastructure and industrial control systems, have created ecological risks that are to a high degree unaddressed. This study compares dam safety arrangements in the United States and Sweden. Dam safety in the United States is highly regulated in many states, but inconsistent over the nation. In Sweden dam safety is managed by self-regulation. The study investigates the weaknesses and strengths in these regulatory and institutional arrangements from a cyber security perspective. If ecological and environmental concerns were a part of the risk evaluation and risk mitigation processes for cyber security, the hazard could be limited. Successful environmentally-linked cyber defense mitigates the risk for significant damage to domestic freshwater, aquatic and adjacent terrestrial ecosystems, and protects ecosystem function.


Author(s):  
Y. V. Sai Bharadwaj ◽  
Sai Bhageerath Y. V ◽  
Y.V.S.S.S.V. Prasada Rao

Cybercrime continues to surge without a slowdown in sight. The cyber security threat continues to worsen. In the first half of 2018, the number of cyber breaches soared over 140% from a year earlier, leading to 33 billion compromised data records worldwide. Cyber Security news such as Marriott hack in Nov 2018 is dominating headlines and becoming a serious headache for business leaders. Malicious outsiders sparked more than half of the 944 breaches and accounted for roughly 80% of stolen, compromised or lost records. Identity theft continues to lead data breach types, but financial access incidents are escalating in severity as well. The United States continues to be the favorite target, and data breaches at major US enterprises continue to grab the headlines. In 2018, the most notable breaches have occurred at Adidas, FedEx, Jason’s Deli, Macy’s, Under Armour, Nordstrom’s and the most popular Facebook. [1].


2021 ◽  
Vol 2 (1) ◽  
pp. 105-122
Author(s):  
Devi Purwanti

The United States and China had conducted cyber cooperation since 2011. But in 2013, both states were involved in the cyber conflict that made the previous cyber collaboration had been ineffective. After that, in 2015, both states agreed to re-form cyber cooperation. This study aims to analyse the United States' motivation in conducting cyber partnerships with China using the cybersecurity concept. This research has discovered at the national level, the United States tried to achieve its information assurance through cyber defence strategy by strengthening collaboration. On the other hand, at the international level, norm construction through bilateral collaboration has made the United States become an impactful actor in international cybersecurity.


With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.


2022 ◽  
pp. 39-55
Author(s):  
Gregory B. White ◽  
Natalie Sjelin

With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.


2010 ◽  
Vol 2 (5) ◽  
Author(s):  
Kate Roth

Universities and Colleges are utilizing virtual worlds such as Secondlife in increasing numbers worldwide. Virtual Worlds also contribute to access to knowledge and the economic development of countries. The capacity for continued utilization and development of virtual worlds is influenced by government policy and investment.   The worldwide performance index of Information and Communication Technology (ICT) is the Network Readiness Index (NRI) of the World Economic Forum. This paper compares and contrasts the performance of the United States (US), the United Kingdom (UK) and Australia since 2006.   This paper then provides a comparison of the UK, US and the Australian government ICT policies and expenditure, as well as each governments approach to cyber-security and Virtual Worlds. The US and the UK have embraced virtual world technologies and Australia has ignored the opportunities presented by Virtual Worlds. 


2020 ◽  
Vol 4 (2) ◽  
pp. 100-111
Author(s):  
Seiko Watanabe

In recent years, cyber-attacks in virtual spaces have been rapidly increasing, and modern centralized states have proven to be incapable of effectively responding to cyber-attacks on their own. To resolve cyber issues, the United States has started cooperating with allied countries such as Japan and the ASEAN countries through Capacity Building (CB). Cyber-attacks include online and physical infrastructures, often referred to as electronic warfare and “hybrid wars.” In this paper, I show the importance of revisiting deterrence theory for cyber security issues. Deterrence theory derives from a traditional International Relations (IR) theory, realism, which emphasizes that states always act to maximize military power. However, in explaining the CB in cyberspace, key concepts and different theoretical frameworks which both scholars of liberalism and neoliberalism advocate, must be incorporated because not only military power, but also economic power has to be taken into account. This paper takes the United States as one case in which infrastructural support in cyberspace is observed. More specifically, I argue that in order for CB to happen, cooperation in cyberspaces must emerge, especially in the realm of economy, legislation, and military support to allied countries. This paper intends to determine the utilities of cyber CB. To do so, I collected data from more than 200 countries and inspected the correlations between cyber-attacks and CB using statistical software R. I also examines other factors such as Internet population, GDP growth rate, war expenditures, economy, military, and law regimes, to determine which are statistically significant in mitigating cyber-attacks.   Keywords: cybersecurity, international relations, realism, liberalism, capacity building


Sign in / Sign up

Export Citation Format

Share Document