Verified Document

Benefits President Obama's Cybersecurity Internet Policy Essay

¶ … President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy.

President Obama's Cybersecurity and Internet Policy: Key Benefits

As reported on the White House website, "Americans deserve an internet that is safe and secure, so that they can shop, bank, communicate, and learn online without fear that their accounts will be hacked or their identity stolen" (White House, 2013). With this in mind, the President has been very supportive of initiatives and measures that support a free and secure internet. Indeed, President Obama has in the past identified cyber threat as being amongst the most serious challenges (from an economic and national security perspective) the country faces today (White House,...

As the White House further points out, the president is of the opinion that going forward; the economic prosperity of this great country will be largely hinged on Cybersecurity.
Some of the initiatives that have been embraced in an attempt to guarantee the safety and openness of the internet as well as the privacy of data include but they are not limited to the International Strategy for Cyberspace and the National Strategy for Trusted Identities in Cyberspace (NSTIC). To begin with, it is important to note that the number of people using the internet to bank and do shopping has in the recent past increased exponentially. In that regard, there exists a need to protect the privacy of such users. According to Schmidt (2011), the measures organizations take to safeguard the privacy of individuals vary significantly. In his own words, Schmidt (2011) points out that "to bring clarity and transparency to these practices, NSTIC seeks to establish clear privacy rules based upon the Fair Information Practice Principles (FIPPs) that address the responsibilities of…

Sources used in this document:
References

Bayuk, J., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. And Weiss, J. (2012). Cyber Security Policy Guidebook. Hoboken, NJ: John Wiley & Sons, Inc.

Schmidt, H.A. (2011, April 26). The National Strategy for Trusted Identities in Cyberspace and Your Privacy. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/blog/2011/04/26/national-strategy-trusted-identities-cyberspace-and-your-privacy

The White House (2013). Technology. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/issues/technology
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now