Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

paper outline cyber information sharing act cisa

Cyber Information Sharing Act (CISA)

Paper Outline

  1. THESIS AND BACKGROUND (Savannah)
    1. Thesis/ position taken in paper
  1. The Cybersecurity Information Act of 2015 aims to build up an information sharing database through prevention, detection, and mitigation of cybersecurity threats. This act requires government agencies to develop strategies to share cyber security threat information with public and private entities to increase response to threats and decrease offenses related to cybersecurity.
  1. Background on the Cyber Information Security Act
  1. The CSA is rolled up under the Consolidated Appropriations Act of 2016 and includes four subsections: Cybersecurity Information Sharing, Federal Cybersecurity Enhancement, Federal Cybersecurity Workforce Assessment, and Other Cybersecurity matters relevant to the private sector (Panetta & Schroth, 2016).
  2. Government entities including the Department of Justice combat the issues related to cybersecurity and information sharing. One of the agencies is the Computer Crime and Intellectual Property Section (CCIPS) of the U.S. Department of Justice… and prevents, investigates, and prosecutes computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts (Craig, 2013).
  3. There are two main definitions within the law: cyber threat indicators and cyber defensive measures.
  • Cyber threat indicators: Information necessary to describe or identify cybersecurity threats
  • Cyber defensive measures: action…or procedure that detects, prevents, or mitigates a cybersecurity threat or security vulnerability (uscode.house.gov, 2015).
  1. ADEQUACIES AND INADEQUACIES (Sierra and Anthony)
    1. What are the benefits of the Cyber Information Security Act (Sierra)
  1. Opens voluntary lines of communication between private businesses and government agencies.
  2. Allows for quick identification and mitigation of potential cybersecurity threats.
  3. Improve collaboration and data sharing between organizations to prevent future cybersecurity attacks.
  1. What weakness does the Cyber Information Security Act have? (Anthony)
  1. Critics of the act have noted the FBI, NSA, and CIA’s extended freedom to potentially invade the privacy of Americans has dramatically increased.
  2. The act’s vague language may prove to be problematic in the future, especially with constantly evolving technology.
  3. Unnecessary sharing of information from private entities to the federal government is unwarranted, especially without specific guidelines to where the information will be going.
  1. Draft a new law to improve the Cybersecurity Information Sharing Act (Anthony)
  1. The new law, which will be named the “Cybersecurity and American Protection Act”, will define, in specificity, the issues and grounds on which data will be collected from companies. It will drift away from CISA in being infamously regarded as a spying act, and more as a protective tool. Many guidelines from CISA will remain the same, but the issues noted above will be remedied.
  1. CONCLUSION
    1. Why our proposal for a new law should be adapted (Nawaf)

1.

2.

3.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"