I need 3 single-space pages 10 references II 111THCONGRESS 1STSESSIONS. 773 To ensure the continued free flow of commerce within the United States and with its global trading partners through secure...

1 answer below »
I need 3 single-space pages 10 references
II 111THCONGRESS 1STSESSIONS. 773 To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communica-tions, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to im-prove and maintain effective cyber security defenses against disruption, and for other purposes. IN THE SENATE OF THE UNITED STATES APRIL1, 2009 Mr. ROCKEFELLER(for himself, Ms. SNOWE, and Mr. NELSONof Florida) in-troduced the following bill; which was read twice and referred to the Com-mittee on Commerce, Science, and Transportation A BILL To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to pro-vide for the development of a cadre of information tech-nology specialists to improve and maintain effective cy-bersecurity defenses against disruption, and for other purposes. Be it enacted by the Senate and House of Representa-1tives of the United States of America in Congress assembled, 2VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:\BILLS\S773.IS S773smartinez on PROD1PC64 with BILLS
2 •S 773 IS SECTION 1. SHORT TITLE; TABLE OF CONTENTS. 1(a) SHORTTITLE.—This Act may be cited as the 2‘‘Cybersecurity Act of 2009’’. 3(b) TABLE OFCONTENTS.—The table of contents for 4this Act is as follows: 5Sec. 1. Short title; table of contents. Sec. 2. Findings. Sec. 3. Cybersecurity Advisory Panel. Sec. 4. Real-time cybersecurity dashboard. Sec. 5. State and regional cybersecurity enhancement program. Sec. 6. NIST standards development and compliance. Sec. 7. Licensing and certification of cybersecurity professionals. Sec. 8. Review of NTIA domain name contracts. Sec. 9. Secure domain name addressing system. Sec. 10. Promoting cybersecurity awareness. Sec. 11. Federal cybersecurity research and development. Sec. 12. Federal Cyber Scholarship-for-Service program. Sec. 13. Cybersecurity competition and challenge. Sec. 14. Public–private clearinghouse. Sec. 15. Cybersecurity risk management report. Sec. 16. Legal framework review and report. Sec. 17. Authentication and civil liberties report. Sec. 18. Cybersecurity responsibilities and authorities. Sec. 19. Quadrennial cyber review. Sec. 20. Joint intelligence threat assessment. Sec. 21. International norms and cybersecurity deterrence measures. Sec. 22. Federal Secure Products and Services Acquisitions Board. Sec. 23. Definitions. SEC. 2. FINDINGS. 6The Congress finds the following: 7(1) America’s failure to protect cyberspace is 8one of the most urgent national security problems 9facing the country. 10(2) Since intellectual property is now often 11stored in digital form, industrial espionage that ex-12ploits weak cybersecurity dilutes our investment in 13innovation while subsidizing the research and devel-14opment efforts of foreign competitors. In the new 15VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:\BILLS\S773.IS S773smartinez on PROD1PC64 with BILLS
Answered Same DayDec 22, 2021

Answer To: I need 3 single-space pages 10 references II 111THCONGRESS 1STSESSIONS. 773 To ensure the continued...

Robert answered on Dec 22 2021
128 Votes
Cyber Security Act of 2009

Introduction:

This paper is the result of the analysis of the cyber security bill introduced by Mr.
Rockefeller, Ms. Snowe & Mr. Nelson of Florida. The bill was referred to the Committee
on Commerce, Science & Transportation. In th
is bill, cyber security issues, security
policies, procedures and programs are discussed. There are many acts formed for
ensuring that security practices are being followed in the private and government
organizations. Standards related to software development and security policies have
been created and measures have been taken to ensure that the said standards are
followed properly. Security awareness is encouraged among people by the government.
Government is also focusing on the research and development of the security standards
and programs.

Focus of the cyber security Bill:

The main aim of this bill is to provide a secure environment so that all the commerce
transactions taking place through internet, in the United States and with its business
partners located globally, can be successfully executed without any kind of security
issues. This bill will help in developing information technology specialists so that cyber
security can be improved and managed effectively, without any security barriers.

Findings:

Following are the findings by the Congress:

 The most important national security concern is related to the cyberspace.
 In this internet era, almost every details is stored in the digital form, be it related
to the business, personal or bank account details. This has made our life very
easy and comfortable but like the other side of the coin, it has a major
disadvantage too in the form of security issues.
 As per the assessment of the 2009 Annual Threat, the cyber-attacks against the
major service provider can rigorously impact the economy of the nation as
compared to the cyber-attacks against software systems used to control the
power-grids or oil refineries.
 Cyber criminals target the information network of the govt. to gain their hold on
the commercial sectors.
 There are lot of e-business developing these days and everyone wants to run
their business at the earliest so they are not following the proper security
standards for the development of their web sites which creates many holes in the
security systems and hackers can take advantage with this.
 Security of the nation is directly dependent on the security of communication and
information technology.
 Cyber security and cyber-attacks go hand-in-hand. As the developers find new
ways to improve the security of the system, in the same manner, hackers are...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here