Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Cybersecurity Legislation Review and Analysis

Introduction 

My writing concludes with current and prospective cybersecurity regulations based on their performance in the last six years and whether the legislation is sufficient. Following careful thought, it is advisable to integrate the November 16, 2018, enacted “Cybersecurity and Infrastructure Security Agency Act of 2018” (CISA Act). The CISA Act was designed to subvert attacks targeting government infrastructure; attacks on the electro system would be considered one of the highest offenses the Act is meant to prevent. Allegations against Russia’s attacks on the 2016 elections are one of the finest details that would provide momentum towards this Act’s development.

Summary of the Act

The Department of Homeland Security’s (D.H.S.) The CISA Act principally established the Cybersecurity and Infrastructure Security Agency (CISA). CISA Act elevates cybersecurity within the federal, reduces threat information, responds to coordination, fortify the protection of critical infrastructure against cyber threats, with sec.501 to 501 under Title V, involving definitions, technical standards, cloud computing strategy, and identity management. (Govinfo.gov. 2014). CISA secures the federal network, coordinates all departments involved in cyber security risk management, and assists different government organs at the federal and local levels in being resilient in protecting digital assets.

CISA Response to Challenges

CISA responds to cyberattacks that target government networks, commercial sector organizations, and essential infrastructure by locating funding to technology and equipment development, lately cryptography and artificial intelligence. CISA viewed the imperativeness of a centralized organization devoted to cybersecurity became apparent as cyber threats increased in frequency and sophistication. Gaps in cybersecurity coordination and communication between federal agencies and the public and commercial sectors prompted the Act.

Applicability of the CISA Act

Often in the United States, applying and enforcing a new law is a challenge; practitioners and enforcers might need to be better versed in legal structure. However, drawing from the threat posed to electro-infrastructural infrastructure, the Act has received much-needed appliance with the upcoming 2024 national elections facing similar risks. For example, Govinfo.gov. (2018) has ”S.E.C. S.E.C. 2201. ø6 U.S.C. 651¿ definitions include critical infrastructure information, provided in section 2222, Cybersecurity risks, meaning the term of section 2209, and Cybersecurity threat section 102 (5) contained in division N of consolidated Appropriations Act 2016. CISA threat intelligence, incident response capabilities, and infrastructure protection measures unify cybersecurity activities under a single agency and encourage stakeholder collaboration. Nevertheless, there are challenges in allocating funds for the legal system and the lack of a specific enforcement organization.

Possible Enhancements to the CISA Law

Despite incidences that the CISA Act has subverted, there is a need for more improved cybersecurity; there is still room for improvement. One component is the ongoing assessment and adjustment requirement in response to changing cyber threats. There is a need to ensure the law is updated in line with cybersecurity protocols for threat assessment and models of identifying and subverting attacks. However, funding is an area that needs constant improvement. For the upcoming election, each county must have a well-funded department incentivizing information sharing and collaboration between government agencies, public-private partnerships, tax incentives, and liability protections.

Provisions Important to Voters to Note

Voters are drawn to the CISA Act’s emphasis on defending vital infrastructure from cyberattacks, including communication networks, transportation networks, and power grids. For example, the Act prioritizes protecting essential services, transportation systems, power grids, and communication networks from cyber threats. CISA has adapted models, definitions, tools, and, most importantly, the notion of cybersecurity threats. Some, such as section 6, cyber threat indicator, means malicious survey. In contrast, the section focuses on defensive measures, often means of an action, procedure, signature, or technique used in information system manipulation.

Conclusion

The Cybersecurity and Infrastructure Security Agency Act of 2018 represents a critical legislative effort to address cybersecurity challenges facing the United States. CISA has correctly facilitated coordination and collaboration amongst government agencies and private sector entities; its comprehensive approach, continuous innovation, and public-private approach would be useful in subverting the 2024 elections. While it has significantly improved coordination and collaboration, ongoing efforts are needed to adapt to evolving threats and strengthen cybersecurity across all sectors.

References

Cybersecurity and Infrastructure Security Agency Act of 2018. Homeland Security Digital Library. Retrieved from https://www.hsdl.org/?abstract&did=817442

Congress.gov. “Legislation.” Retrieved from https://www.congress.gov/

Cybersecurity and Infrastructure Security Agency Act of 2018, Pub. L. No. 115-278, 132 Stat. 4176 (2018).

Govinfo.gov. (2018). Cybersecurity and Infrastructure Security Agency Act of … https://www.govinfo.gov/content/pkg/COMPS-15296/pdf/COMPS-15296.pdf

Govinfo.gov. (2014). Public Law 113 – 274 – Cybersecurity Enhancement Act of 2014. GovInfo. https://www.govinfo.gov/app/details/PLAW-113publ274

United States. Congress. House. Committee on Homeland Security. (2018). “Cybersecurity and Infrastructure Security Agency Act of 2018.” Retrieved from https://www.congress.gov/bill/115th-congress/house-bill/3359/text

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics