Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 5 Discussion 2 Government and Private Sector Partnership in Critical Infrastructure Protection

Module 5 Discussion 2 Government and Private Sector Partnership in Critical Infrastructure Protection

Q Module 5 In most countries the majority of the critical infrastructure is owned and operated by the private sector. In the United States, the figure is approximately 85% according to the Information Sharing Environment (Links to an external site.). Homeland Security Presidential Directive (HSPD) No. 7 (Links to an external site.) requires the Department of Homeland Security and the Sector Specific Agencies to collaborate with private sector entities and to share information on cyber threats, vulnerabilities, and best practices. The readings from Kaplan (2009) and Earls (2015) highlighted the difficulty in getting Congress to take the necessary legislative action to resolve some of the sticky legal issues in sharing information from government to the private sector and between private sector entities. The CISA legislation of December 2015 (Gardner & Broder, 2016) addressed some of these issues. Has it gone far enough? The module learning outcomes addressed in this activity are: • Explain the roles and responsibilities of U.S. Department of Homeland Security and in developing and executing critical infrastructure protection policy (CO #1, #3) • Discuss the role of the National Institute of Standards (NIST) cybersecurity framework (CO #3) • Explain the role of the private sector in securing the nation’s critical infrastructure. (CO #1, #3) The input of each student adds value to the course and creates a better experience for everyone. Although this is an online asynchronous course that you can access on your own schedule, your regular participation is mandatory. You will be expected to log in and participate at least two times per week on separate days throughout the term. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Please contribute at least one original post, due on Wednesday at 11:59 p.m. Eastern time, with at least two substantive replies to fellow students posted by Sunday at 11:59 p.m. Eastern time. Keep in mind that if reply posts come in Sunday evening, this is not a robust discussion. I reserve the right to ask you to contribute sooner or more frequently if this will enhance learning. Question After completing the assigned readings for the module, please respond to the following question in your initial post: • Congress was slow to pass legislation on cybersecurity information sharing. The Cybersecurity Information Sharing Act (CISA) of 2015 followed at least ten years of discussion. Consider the electric power grid and the threats it faces, what are the limitations of the CISA and provide two changes/additions would you recommend? Please cite course materials or outside research when discussing your conclusions. Response: Your replies to classmates must be substantive; posting “I agree” is a start, but you also need to explain why. Replies should contribute to the discussion as a whole by integrating what you have learned from your required readings. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Consult the Discussion Posting Guide for information about writing your discussion posts. It is recommended that you write your post in a document first. Check your work and correct any spelling or grammatical errors. This is a “post first” discussion forum, which means you must submit your initial post before you can view other students’ posts.

View Related Questions

Solution Preview

The limitations of the CISA consist of the aspect of personal information being unethically spread (Hébert, 2013). The destinations of spreading of this type of information are agencies affiliated to and owned by the government (Hébert, 2013). This implies that any member of any government agency will be able to view any category of personal information of any American citizen. This spreading of personal information becomes unethical as well as illegal to a great extent. This is because there can be misuse of this information by any of the members of any of the governmental agencies. There can be this information passed to an individual not belonging to any of the governmental agencies of America (Hébert, 2013).