Benefits President Obama's Cybersecurity Internet Policy Essay

PAGES
2
WORDS
678
Cite

¶ … President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy.

President Obama's Cybersecurity and Internet Policy: Key Benefits

As reported on the White House website, "Americans deserve an internet that is safe and secure, so that they can shop, bank, communicate, and learn online without fear that their accounts will be hacked or their identity stolen" (White House, 2013). With this in mind, the President has been very supportive of initiatives and measures that support a free and secure internet. Indeed, President Obama has in the past identified cyber threat as being amongst the most serious challenges (from an economic and national security perspective) the country faces today (White House,...

...

As the White House further points out, the president is of the opinion that going forward; the economic prosperity of this great country will be largely hinged on Cybersecurity.
Some of the initiatives that have been embraced in an attempt to guarantee the safety and openness of the internet as well as the privacy of data include but they are not limited to the International Strategy for Cyberspace and the National Strategy for Trusted Identities in Cyberspace (NSTIC). To begin with, it is important to note that the number of people using the internet to bank and do shopping has in the recent past increased exponentially. In that regard, there exists a need to protect the privacy of such users. According to Schmidt (2011), the measures organizations take to safeguard the privacy of individuals vary significantly. In his own words, Schmidt (2011) points out that "to bring clarity and transparency to these practices, NSTIC seeks to establish clear privacy rules based upon the Fair Information Practice Principles (FIPPs) that address the responsibilities of…

Sources Used in Documents:

References

Bayuk, J., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. And Weiss, J. (2012). Cyber Security Policy Guidebook. Hoboken, NJ: John Wiley & Sons, Inc.

Schmidt, H.A. (2011, April 26). The National Strategy for Trusted Identities in Cyberspace and Your Privacy. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/blog/2011/04/26/national-strategy-trusted-identities-cyberspace-and-your-privacy

The White House (2013). Technology. Retrieved February 6, 2013, from the White House website: http://www.whitehouse.gov/issues/technology


Cite this Document:

"Benefits President Obama's Cybersecurity Internet Policy" (2013, February 06) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/benefits-president-obama-cybersecurity-internet-85722

"Benefits President Obama's Cybersecurity Internet Policy" 06 February 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/benefits-president-obama-cybersecurity-internet-85722>

"Benefits President Obama's Cybersecurity Internet Policy", 06 February 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/benefits-president-obama-cybersecurity-internet-85722

Related Documents

Department Defense Inspector General Office U.S Defense Inspector general The United States office of Department of Defense Inspector General has been inexistence since 1982 as a result of the amendment of the inspector general act of 1978 (John, 2011). It is responsible for conducting, monitoring, supervising and initiating evaluation and audits the programs and operations related to the department of defense. It also has the duty to provide leadership and coordinate and

According to Toronto Star reporter Stephan Handelman in an article printed in 2005, the U.S. senior intelligence analysts consider China to be the greatest long-term threat to U.S. stability. China's military force and computer intelligence has reached its peak. Both the Europeans and the U.S. agree that the expansion of the Chinese military is more than "worrisome." Another article posted on November 16, 2007 by the Washington Post claims that spying

Law and Wikileaks
PAGES 15 WORDS 4615

Wiki Leaks The whistle-blowing WikiLeaks is an online organization situated in Sweden; this organization distributed records termed "the diplomatic cables" from U.S. foreign negotiators on November 28, 2010. Upon their distribution, lawmakers from all corners of the U.S. political space censured the organization (Steinmetz). Within a brief time period, WikiLeaks turned into the biggest and most famous whistle-blowing organization on the planet. Due partially to the release of huge amounts of