The Secret of US Success in the Field of Information Security
DOI:
https://doi.org/10.29038/2524-2679-2018-01-66-71Keywords:
information security, cyber attack, cyber threat, USA, cyber security, cyberspace, cyber-insuranceAbstract
The study found many factors contributing to the successful US information policy. Among them are regulatory legal regulation, successful policy of state bodies and the administration of the president, public awareness and confidence, cyber-insurance and international cooperation.
It is noted that the US has a strong legislative base. The beginning of the development of information security was laid in the first half of the twentieth century. It is emphasized that the further course of the whole state depends on the administration of the president, therefore the two last Presidents paid much attention to the problem of cyber-terrorism. They recognized that cybercrime and cyber-espionage threaten the national security of the country.
The US law on external information security has been described, which includes a set of federal laws, state laws and regulations that together form the legal basis for the formation and implementation of state policy in the field of information security. The main features of the National Cyber Spaces Protection Strategy (2003), Cyber Security Review (2009), the Comprehensive National Cyber Security Initiative (2010), the US Cybersecurity Strategy 2011, the CISPA 2012 Act (Cyber Intelligence Sharring and Protection Act) were highlighted.
The five main directions of activity on information protection issues that are defined by the Strategy are analyzed: constant monitoring and continuous evaluation of threats and vulnerabilities of state information systems; implementation of national measures to reduce the threats and vulnerabilities of cyberspace; implementation of measures to protect the information systems of the authorities; providing quality education and training on issues of protection of cyberspace; cooperation on issues of national security and security of international cyberspace.
It is proved that cyber insurance is becoming widespread within the country, thus reducing the chances of cybercriminals to commit cyber attacks. International cooperation is one of the important components of ensuring information security.
References
Andress J. The Basics of Information Securit. URL: http://www.sciencedirect.com/science/article/pii/B9781597496537 000013.
Combating Cyber Crime. URL: https://www. dhs.gov/topic/combating-cyber-crime.
Digital Literacy in 2015: America’s Complicated Relationship with the Internet URL: http://www.rasmussen.edu/resources/digital-literacy-in-america/.
Larson S. The hacks that left us exposed in 2017. URL: http://money.cnn.com/2017/12/18/technology/biggestcyberattacks-of-the-year/ index.html.
Majeed M. Top and Most Impactful Cyber Attacks in the USA. URL: http://blog.externetworks.com/topcyber-attacks-in-the-usa/.
Norton Cyber Security Insights Report 2017 United States Result. URL: http://now.symassets.com/content/dam/norton/global/pdfs/norton_ cybersecurity_insights/NCSIR-global-results-US.pdf.
The benefits of Cyber Insurance. URL: https://www.loricainsurance.com/legacy/documents/Summary_-_Cyber.pdf.
The New US Security Agenda: Trends and Emerging Threats. URL: goo.gl/5C3WiJ.
What is cyber insurance and why you need it. URL: https://www.cio.com/article/3065655/cyber-attacksespionage/what-is-cyber-insurance-and-why-you-need-it.html.
Why 27% of U.S. Firms Have No Plans to Buy Cyber Insurance. URL: https://www.insurancejournal.com/news/national/2017/05/31/ 452647.htm.