Hass and Associate blog reviews, cyber-defense

8 1 0
                                    

Within a week of each other, have both the European Commission and the white house put out a number of new rules designed to curb the growing cyber-attacks against public and private offerings. The most dangerous of these is aimed at what is called critical national infrastructure. The dimensions may be physical (e.g. , mains) or virtual, such as computer networks used by the financial system.

Together with his the union message on 11 February, released on Barack Obama Obama an executive order intended to plug hole that is left of the failure of Congress to pass legislation for cyber-security that complies with the growing threat. "We cannot look back years from now", he said, "and wonder why we did nothing in the face of real threats to our security and the economy." President's frustration originates from the fate of two action. One is Cyber intelligence-sharing and Protection Act, known as CISPA, adopted by of the house of Representatives in last year, that is not managed to make it to a vote in the Senate (the white house threatened a veto because of concerns about privacy).  The other is the Cyber security Act, which was supported by management, but fell victim to a Republican filibusters in the Senate.

If all sides agree on seriousness of the threat, can impede Americas biased split agreement even in cyber-security. The majority opinion poll emphasize national security and sharing of information, but want to avoid imposing oppressive government-set safety standards on private companies. Mr Obama's executive order focuses on sharing information about threats between government and the private sector.

read more: 

http://communities.ptc.com/blogs/hassausooke/2013/06/09/hass-and-associate-hvordan-amerika-og-europa-pr%C3%B8ver-%C3%A5-styrke-deres-cyber-forsvar

You've reached the end of published parts.

⏰ Last updated: Jun 13, 2013 ⏰

Add this story to your Library to get notified about new parts!

Hass and Associate blog reviews, cyber-defenseWhere stories live. Discover now