An Overview of the Community Cyber Security Maturity Model

Author(s):  
Gregory B. White ◽  
Mark L. Huson

The protection of cyberspace is essential to ensure that the critical infrastructures a nation relies on are not corrupted or disrupted. Government efforts generally focus on securing cyberspace at the national level. In the United States, states and communities have not seen the same concentrated effort and are now the weak link in the security chain. Until recently there has been no program for states and communities to follow in order to establish a viable security program. Now, however, the Community Cyber Security Maturity Model has been developed to provide a framework for states and communities to follow to prepare for, prevent, detect, respond to, and recover from potential cyber attacks. This model has a broad applicability and can be adapted to be used in other nations as well.

2021 ◽  
Vol 2 (1) ◽  
pp. 105-122
Author(s):  
Devi Purwanti

The United States and China had conducted cyber cooperation since 2011. But in 2013, both states were involved in the cyber conflict that made the previous cyber collaboration had been ineffective. After that, in 2015, both states agreed to re-form cyber cooperation. This study aims to analyse the United States' motivation in conducting cyber partnerships with China using the cybersecurity concept. This research has discovered at the national level, the United States tried to achieve its information assurance through cyber defence strategy by strengthening collaboration. On the other hand, at the international level, norm construction through bilateral collaboration has made the United States become an impactful actor in international cybersecurity.


With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.


2022 ◽  
pp. 39-55
Author(s):  
Gregory B. White ◽  
Natalie Sjelin

With the increase in cybercrimes over the last few years, a growing realization for the need for cybersecurity has begun to be recognized by the nation. Unfortunately, being aware that cybersecurity is something you need to worry about and knowing what steps to take are two different things entirely. In the United States, the National Institute of Standards and Technology (NIST) developed the Cyber Security Framework (CSF) to assist critical infrastructures in determining what they need in order to secure their computer systems and networks. While aimed at organizations, much of the guidance provided by the CSF, especially the basic functions it identifies, are also valuable for communities attempting to put together a community cybersecurity program.


2020 ◽  
Vol 4 (2) ◽  
pp. 100-111
Author(s):  
Seiko Watanabe

In recent years, cyber-attacks in virtual spaces have been rapidly increasing, and modern centralized states have proven to be incapable of effectively responding to cyber-attacks on their own. To resolve cyber issues, the United States has started cooperating with allied countries such as Japan and the ASEAN countries through Capacity Building (CB). Cyber-attacks include online and physical infrastructures, often referred to as electronic warfare and “hybrid wars.” In this paper, I show the importance of revisiting deterrence theory for cyber security issues. Deterrence theory derives from a traditional International Relations (IR) theory, realism, which emphasizes that states always act to maximize military power. However, in explaining the CB in cyberspace, key concepts and different theoretical frameworks which both scholars of liberalism and neoliberalism advocate, must be incorporated because not only military power, but also economic power has to be taken into account. This paper takes the United States as one case in which infrastructural support in cyberspace is observed. More specifically, I argue that in order for CB to happen, cooperation in cyberspaces must emerge, especially in the realm of economy, legislation, and military support to allied countries. This paper intends to determine the utilities of cyber CB. To do so, I collected data from more than 200 countries and inspected the correlations between cyber-attacks and CB using statistical software R. I also examines other factors such as Internet population, GDP growth rate, war expenditures, economy, military, and law regimes, to determine which are statistically significant in mitigating cyber-attacks.   Keywords: cybersecurity, international relations, realism, liberalism, capacity building


First Monday ◽  
2019 ◽  
Author(s):  
Sean Lawson ◽  
Michael K. Middleton

During the two and a half decades leading up to the Russian cyber attacks on the 2016 U.S. presidential election, public policy discourse about cybersecurity typically framed cybersecurity using metaphors and analogies to war and tended to focus on catastrophic doom scenarios involving cyber attacks against critical infrastructure. In this discourse, the so-called “cyber Pearl Harbor” attack was always supposedly just around the corner. Since 2016, however, many have argued that fixation on cyber Pearl Harbor-like scenarios was an inaccurate framing that left the United States looking in the wrong direction when Russia struck. This essay traces the use of the cyber Pearl Harbor analogy and metaphor over the 25-year period preceding the Russian cyber attacks of 2016. It argues that cyber Pearl Harbor has been a consistent feature of U.S. cybersecurity discourse with a largely stable meaning focused on catastrophic physical impacts. Government officials have been primarily responsible for driving these concerns with news media uncritically transmitting their claims. This is despite the fact that such claims were often ambiguous about just who might carry out such an attack and often lacked supporting evidence.


2021 ◽  
pp. 121-128
Author(s):  
S. CIAPA

The article considers the legal and organizational aspects of ensuring the protection of the critical information infrastructure from cyberattacks. Attention is drawn to the positive experience of the United States in ensuring the resilience of the objects of critical infrastructure. The provisions of the new Cyber Security Strategy of Ukraine are analyzed, one of the priorities of which is to improve the regulatory framework for cyber security of critical information infrastructure. The shortcomings of the previous Cyber Security Strategy of Ukraine (2016) are noted. Contains a detailed analysis of legislation and initiatives on providing cybersecurity. General requirements for cyber protection of critical infrastructure objects are considered. Based on the analysis of the current legislation on cyber security of Ukraine, ways to improve the legal and organizational support for the protection of the critical information infrastructure from cyber attacks are proposed.


Author(s):  
Mary Donnelly ◽  
Jessica Berg

This chapter explores a number of key issues: the role of competence and capacity, advance directives, and decisions made for others. It analyses the ways these are treated in the United States and in selected European jurisdictions. National-level capacity legislation and human rights norms play a central role in Europe, which means that healthcare decisions in situations of impaired capacity operate in accordance with a national standard. In the United States, the legal framework is more state-based (rather than federal), and the courts have played a significant role, with both common law and legislation varying considerably across jurisdictions. Despite these differences, this chapter identifies some similar legal principles which have developed.


Foods ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 1816
Author(s):  
Michael F. Tlusty

Humans under-consume fish, especially species high in long-chain omega-3 fatty acids. Food-based dietary guidelines are one means for nations to encourage the consumption of healthy, nutritious food. Here, associations between dietary omega-3 consumption and food-based dietary guidelines, gross domestic product, the ranked price of fish, and the proportions of marine fish available at a national level were assessed. Minor associations were found between consumption and variables, except for food-based dietary guidelines, where calling out seafood in FBDGs did not associate with greater consumption. This relationship was explored for consumers in the United States, and it was observed that the predominant seafood they ate, shrimp, resulted in little benefit for dietary omega-3 consumption. Seafood is listed under the protein category in the U.S. Dietary Guidelines, and aggregating seafood under this category may limit a more complete understanding of its nutrient benefits beyond protein.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 441-441
Author(s):  
Joseph Blankholm

Abstract There are more than 1,400 nonbeliever communities in the United States and well over a dozen organizations that advocate for secular people on the national level. Together, these local and national groups comprise a social movement that includes atheists, agnostics, humanists, freethinkers, and other kinds of nonbelievers. Despite the fact that retired people over 60 dedicate most of the money and energy needed to run these groups, the increasingly vast literature on secular people and secularism has paid them almost no attention. Relying on more than one hundred interviews (including dozens with people over 60), several years of ethnographic research, and a survey of organized nonbelievers, this paper demonstrates the crucial role that people over 60 play in the American secular movement today. It also considers the reasons older adults are so important to these groups, the challenges they face in trying to recruit younger members and combat stereotypes about aging leadership, and generational differences that structure how various types of nonbeliever groups look and feel. This paper reframes scholarly understandings of very secular Americans by focusing on people over 60 and charts a new path in secular studies.


2008 ◽  
Vol 8 (1) ◽  
pp. 53-77 ◽  
Author(s):  
Peter H. Koehn

At present, progress in mitigating global GHG emissions is impeded by political stalemate at the national level in the United States and the People's Republic of China. Through the conceptual lenses of multilevel governance and framing politics, the article analyzes emerging policy initiatives among subnational governments in both countries. Effective subnational emission-mitigating action requires framing climatic-stabilization policies in terms of local co-benefits associated with environmental protection, health promotion, and economic advantage. In an impressive group of US states and cities, and increasingly at the local level in China, public concerns about air pollution, consumption and waste management, traffic congestion, health threats, the ability to attract tourists, and/or diminishing resources are legitimizing policy developments that carry the co-benefit of controlling GHG emissions. A co-benefits framing strategy that links individual and community concerns for morbidity, mortality, stress reduction, and healthy human development for all with GHG-emission limitation/reduction is especially likely to resonate powerfully at the subnational level throughout China and the United States.


Sign in / Sign up

Export Citation Format

Share Document