HLS 571 International Module 2 Law Discussion

Discussion Assignment Response (3 TOTAL)

Discussion Requirements

Don't use plagiarized sources. Get Your Custom Essay on
HLS 571 International Module 2 Law Discussion
Just from $9/Page
Order Essay

 

A substantive comment should be approximately 300 words or more for each of the responses (3 TOTAL).

 

Read the initial comments posted by your classmates and reflect upon them.

 

Before writing your comments:

 

Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.

Review some resources to help you synthesize, such as the following:

Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.html

 

NOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.

 

Be sure to meet all of the criteria in the rubric, as noted in the instructions above.

 

Third post for each module discussion:

 

Read the initial and secondary comments posted by your classmates and reflect upon them.

 

Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.

 

MY DISCUSSION (DO NOT RESPOND TO THIS POST PLEASE)

 

(DO NOT RESPOND TO THIS POST PLEASE)

 

(DO NOT RESPOND TO THIS POST PLEASE)

 

(DO NOT RESPOND TO THIS POST PLEASE)

 

Classmates and Professor,

 

Cyber Policies: Government and Private Cooperation

 

Today, information technology (IT) has improved communication, economies, and business activities globally. However, the rapid advancement in information technology has created new cybersecurity challenges among private firms and governments. Therefore, the U.S. National Security Strategy has been developed to combat cybercrime, protect crucial infrastructure, and secure government networks.

 

Setting Cybersecurity Policies

 

 

Creating an effective national security strategy requires a collaborative strategy between private organizations and the government. The Federal government should engage state and local governments and private organizations in setting highly efficient cybersecurity policies (Kurtz, 2015). The collaborative strategy facilitates the delineation of stakeholders’ responsibilities and roles for cybersecurity. For instance, the Federal government must collaborate with local and state governments in defending and protecting the nation. Supporting cybersecurity policies allows these government levels to maximize the welfare and safety of citizens within their jurisdictions. For instance, government levels monitor security practices implementation among business organizations and agencies (The White House, 2014). The governments enact policies that allow private organizations to share cybersecurity information with other stakeholders freely. The governments also allocate funds to cybersecurity programs and protect critical infrastructures within their jurisdictions. On the other hand, private organizations design, construct and operate different network structures that support personal and public users.

 

Current U.S. Cybersecurity Policies Implementation

 

 

The United States Federal government has played an active role in enacting cybersecurity policies in the 21st Century. For instance, President Obama continuously criticized Chinese government espionage and hacking into the Federal government’s information systems. Obama also participated in the enactment of cybersecurity policies aimed at protecting citizens and critical infrastructure. Obama received tremendous support from the U.S. Congress in his cybersecurity endeavors. For instance, the U.S. Congress enacted The National Cybersecurity Protection Advancement Act and the Protecting Cyber Networks Act between 2015 and 2016 (Richards, 2015). The Senate also passed the Cybersecurity Information Sharing Act in 2015 to promote collaboration between private organizations and government agencies in cyberattacks investigation programs.

 

Numerous states in the nation enacted numerous policies to improve cybersecurity at their administrative levels. For instance, more than 35 states considered over 265 bills regarding cybersecurity in 2018 (NCSL, 2019). The major objectives of these legislations were improving security practices and funding cybersecurity initiatives. The policies further aimed at restricting sensitive government information disclosure to the public. Legislations were further designed to promote workforce training on cybersecurity strategies. For instance, Arizona enacted the cybersecurity legislation in 2018 to support the Federal government in combating cybersecurity threat. In the same year, Georgia enacted legislation that criminalized unauthorized computer networks and computer access.

 

 

In conclusion, information technology development has created new securing challenges for private companies and governments. Hence, governments should collaborate with private organizations in the cybersecurity policies creation and implementation processes. Different policies enacted since 2015 have enabled U.S. federal and state governments to protect citizens, businesses, and critical infrastructure.

 

Pedro

 

References

 

Kurtz, P. (2015). Congress wants companies facing cyber attacks to share data, and it’s not a moment too soon. Quartz Media. https://qz.com/407215/congress-wants-companies-fac…

 

NCSL. (2019). Cybersecurity Legislation 2018. National Conference of State Legislatures. https://www.ncsl.org/research/telecommunications-a…

 

Richards , W. H. (2015). Congressional action on cybersecurity would send strong message to China. The Hill. https://thehill.com/blogs/congress-blog/technology…

 

The White House. (2014). Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure. Washington D.C.: United States Executive Office of the President. https://fas.org/irp/eprint/cyber-review.pdf

 

__________________________________________________________________________________________________

 

RESPONSE 1

 

Good Afternoon Professor and Classmates,

 

The Cybersecurity Information Sharing Act (CISA), signed into law by President Obama on December 18, 2015, enables businesses to share cyber threat information with the federal government and establishes as process for federal agencies to receive this threat information. By doing so, the forensics from these attacks can be analyzed by experts in hopes of determining the origin of the attack. Additionally, provisions within the law enable the sharing of unclassified intelligence information with other non-federal entities to prevent similar attacks against other businesses (Obama, 2015). Opponents to it, such as Apple and Reddit, argue the law will infringe on the privacy of online users (Jontz, 2015).

 

In addition to the passage of CISA, several other cybersecurity laws have been recently passed. The Cybersecurity Enhancement Act of 2014 bolsters the partnership between public and private research and development of cybersecurity initiatives. The Federal Exchange Data Breach Notification Act of 2015 requires healthcare agencies to notify an individual if there is evidence to suggest their personal information was compromised because of a cyberattack or data breach. The National Cybersecurity Protection Advancement Act of 2015 amends the provisions from the Homeland Security Act of 2002 to include the National Cyber Security and Communications Integration Center, tribal governments, and non-governmental organizations (Singh, 2018).

 

Currently, there is ongoing legislation for the passage of the Cyber Diplomacy Act of 2021. One of the provisions of the bill will be to create an Office of International Cyberspace Policy within the State Department, giving the department the leverage to advocate for international cyber diplomacy (Brumfield, 2021).

 

ANDREW

 

References

 

Brumfield, C. (2021, February 25). Cyber Diplomacy Act aims to elevate America’s global cybersecurity standing. Retrieved from CSO: https://www.csoonline.com/article/3609518/cyber-di…

 

Jontz, S. (2015, October 27). Senate Overwhelmingly Passes Controversial Cybersecurity Bill, Angering Opponents. Retrieved from AFCEA: https://www.afcea.org/content/?q=Article-senate-ov…

 

Obama, P. B. (2015, December 15). Cybersecurity Information Sharing Act of 2015. Retrieved from CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY: https://www.cisa.gov/sites/default/files/publicati…

 

Singh, H. (2018, January 7). A Glance At The United States Cyber Security Laws. Retrieved from Appknox: https://www.appknox.com/blog/united-states-cyber-s…

 

__________________________________________________________________________________________________

 

RESPONSE 2

 

Good evening class!

 

What should be the government and private roles in setting policies for cybersecurity?

 

The government and private sector must and do work together to address cyber threats and policies to address them. Information sharing has been beneficial in cyber intelligence for both the government and private sector. Levite et al. (2018) suggests that the private sector is struggling with the increased scope, scale, and complexity of risks presented by cyber threats to corporations’ finances, reputation, and properties (Executive Summary, para. 1). Due to this struggle, some private sector organizations have turned to cyber insurance policies as corporations resist intrusive government regulation other interventions (Levite et al., 2018, para. 23). With the experience of all involved, a partnership between the cyber threat insurance companies, private sector community, and the government would help with mitigating efforts being developed to prevent successful cyber-attacks.

 

What is the current status of U.S. policy for cyber and what is currently being considered by the President and Congress?

 

There is currently legislation in the works that is being introduced by members of Congress named the Cyber Diplomacy Act of 2021. The bill is designed to promote American international leadership on cybersecurity and establishes an Office of International Cyberspace Policy within the State Department (Brumfield, 2021, para. 1 & 3).

 

Christopher

 

REFERENCE:

 

Brumfield, C. (February 25, 2021). Cyber Diplomacy Act aims to elevate America’s Global cybersecurity standing. Retrieved from https://www.csoonline.com/article/3609518/cyber-diplomacy-act-aims-to-elevate-americas-global-cybersecurity-standing.html

 

Levite, A.E., Kannry, S., & Hoffman, W. (November 7, 2018). Addressing the Private Sector Cybersecurity Predicament: The Indispensable Role of Insurance. Retrieved from https://carnegieendowment.org/2018/11/07/addressing-private-sector-cybersecurity-predicament-indispensable-role-of-insurance-pub-77622

 

__________________________________________________________________________________________________

 

RESPONSE 3

 

Professor and Classmates,

 

The government and private sectors my have established polies for cybersecurity to protect their employees and their customers. Personal Identity Information may become easily accessible with some employers and the executives must protect their team. Policies and regulations must be established and every employee must read and sign an agreement acknowledging that cyber crimes is in violation of the law and will be prosecuted if found guilty. Personal information may not only be someone’s social security number, but financial records and other private information. On the flip side, policies need to be established to avoid damage to critical infrastructure. The Chief Information Officers Council Stated “Our Nation’s security and economic prosperity depend on the stability and integrity of our Federal communications and information infrastructure. Threats to cyberspace pose some of the most serious challenges of the 21st century for the United States. The President has made strengthening the Nation’s cybersecurity a priority from the outset of this Administration (CIO.gov, 2020).”

 

Furthermore, President Donald Trump signed the Cybersecurity and Infrastructure Security Agency Act of 2018 into law. The landmark legislation increases the mission set of the National Protection and Programs Directorate within the Department of Homeland Security. The initiative also established the Cybersecurity and Infrastructure Security Agency which build the national capacity to defend cyber attacks (Department of Homeland Security, 2021). The reason for the President and Congress to act is the following policy of Section 1636:

 

“SEC. 1636. POLICY OF THE UNITED STATES ON CYBERSPACE, CYBERSECURITY, CYBER WARFARE, AND CYBER DETERRENCE.

 

(a) IN GENERAL.—It shall be the policy of the United States, with respect to matters pertaining to cyberspace, cybersecurity, and cyber warfare, that the United States should employ all instruments of national power, including the use of offensive cyber capabilities, to deter if possible, and respond to when necessary, all cyber attacks or other malicious cyber activities of foreign powers that target United States interests with the intent to—

 

(1) cause casualties among United States persons or persons of United States allies;

 

(2) significantly disrupt the normal functioning of United States democratic society or government (including attacks against critical infrastructure that could damage systems used to provide key services to the public or government);(3) threaten the command and control of the Armed Forces, the freedom of maneuver of the Armed Forces, or the industrial base or other infrastructure on which the United States Armed Forces rely to defend United States interests and commitments; or(4) achieve an effect, whether individually or in aggregate, comparable to an armed attack or imperil a vital interest of the United States (McCain, 2019).”-David Schible

 

DAVID

 

References:

 

Chief Information Officers . (2021). Policies & Priorities. Policies & Priorities | CIO.GOV. Retrieved on March 3, 2021, from https://www.cio.gov/policies-and-priorities/cybersecurity/.

 

Department of Homeland Security. (2021, March 1). Cybersecurity. Department of Homeland Security. Retrieved on March 3, 2021, from https://www.dhs.gov/topic/cybersecurity.

 

McCain, J. (2019). FY2019 NDAA: Policy of the United States on Cyberspace, Cybersecurity, Cyber Warfare, and Cyber Deterrence. Retrieved on March 3, 2021, from https://fas.org/sgp/news/2018/07/ndaa-1636.html


Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently
 

Online Academic Help With Different Subjects

Literature

Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.

Finance

Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!

Psychology

While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.

Engineering

Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.

Nursing

In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.

Sociology

Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.

Business

We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!

Statistics

We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.

Law

Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!
Open chat
1
Need assignment help? You can contact our live agent via WhatsApp using +1 718 717 2861

Feel free to ask questions, clarifications, or discounts available when placing an order.
  +1 718 717 2861           + 44 161 818 7126           [email protected]
  +1 718 717 2861         [email protected]