Emergency Management Perspectives in Cybersecurity Policy Analysis

Verified

Added on  2023/04/23

|10
|2231
|432
Report
AI Summary
This report provides a comprehensive analysis of cybersecurity and emergency management policies, focusing on state-level applications. It recommends strategies for building successful cybersecurity programs, emphasizing collaboration, multidisciplinary problem-solving, and data management. The report also addresses the need for updated regulatory models to tackle 21st-century cybersecurity challenges, particularly within government organizations. It concludes by highlighting the importance of proactive cybersecurity measures and continuous policy improvement to protect data integrity and manage risks effectively. Desklib offers a variety of resources, including past papers and solved assignments, to aid students in their studies.
Document Page
Running head: CYBER SECURITY 1
Emergency Management Perspectives in Cyber Security
Name (Student #)
University Name (EDMG 600)
Professor's Name
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 2
Emergency Management Perspectives in Cyber Security
It is quite evident that Cybersecurity has been an integral part of saving a business and its
information nowadays. Cybersecurity is most commonly associated with information technology
and its three aspects of people, process and technology. the introduction of Information and
Technology system within organizational processes have been considered as a supreme
advancement of business processes with the amalgamation of technology but this is also been
one of the huge problems that is impossible to control with the movement of data and the
effective processes (Bertino and Hartman, 2015). This is why the concerns about the
Cybersecurity problems have made it inevitable that every organization follows a set policy that
makes it easier for the organizations to set up a security risk management that would secure the
information generated within the organization. Therefore following would be a Cybersecurity /
EM policy analytical model generated to justify the most effective way of managing Emergency
Management related Cyber security issues at the state level and several security related issues
would be addressed from a provided case study.
Part 1:
Cybersecurity/EM Policy Analytical Model
. Reviewing the Cybersecurity landscape, it can be said that every organization needs to
develop a Cybersecurity or emergency management policy following a static analytical morning.
This would help the organization in gaining a proper framework of organizing the day to day
operations while at the same time protecting the integrity of the information generated within the
organization. Following would be a recommendation about few strategies for building successful
Document Page
CYBER SECURITY 3
programs with activities of CISO for setting up a Cybersecurity or emergency management
analytical model for the state level:
1. The increasing of using collaboration and network affiliated by the state Cyber
security officials: The chief information security officers should be responsible for managing the
Cybersecurity in parts. This means that only aspects of Cybersecurity should be segregated for
management. This would include identifying the Cyber security risks, mobilizing them,
advertising them in order of risk factor and helping the particular public sector knowledge
networks available to the Cyber security issues (Deloitte-NASCIO, 2013). All the chief
information security officers should recognize the factor that forms the base of all of these
networks which is to be developed and preserved for the improvement of interpersonal
relationships between the aspects of Cyber security management within the organization and
should not follow a command or control perspective. This particular policy should have key
activities enlisted, including, the Chief Information Security Officer and their networks Bee
family rooted for free exchange of information respecting the privacy of the information,
appropriateness as well as professionalism in the exchange of information, the policy should
focus on industrialization of the approaches working for different kinds of organization under
different state environment, the funding and building of acrostic interaction formed between the
chief information security officers through communication mechanisms of a varied kind and the
investment done for maintenance and development of the networks for achieving specific project
across states (Newsome and Jarmon, 2015).
2. The officials and responsibility of managing the Cybersecurity should make an
evaluation of the informal or formal relationship with the federal Cyber security officials: This
is to specify that the authority or status between the state Cyber security officials and federal
Document Page
CYBER SECURITY 4
Cybersecurity official are managed and identified through which their responsibilities should be
specified appropriately (Goodyear et al., 2010). Due to this the managerial effort would be
directed towards the proper way in mitigating, removal or bar in the bottom of participatory
governance by states when it would come to the national Cybersecurity programs.
3. The officials in responsibility of managing the state Cybersecurity should increase
much time in devoting attention to receiving of multidisciplinary problem solving training:
This particular policy mentions how the state Cyber security officials are in proper need of a
practical philosophy of multiply problem solving methods (Conteh and Schmick, 2016). For the
continued success of the Cybersecurity efforts it is critical that the development of networks
across security discipline is maintained. In this way, the state Cyber security officials can
broaden their networks and prioritize this particular policy to challenge the current professional
culture and expand the zone of offering services in protecting the integrity of information
generated within an organization.
4. Collaboration competency is a particular zone of training that state Cyber security
officials should maintain and followed to identify the competency of being recognized and
rewarded: Technical education of a state Cybersecurity official is absolutely important but at the
same time the management of Cyber security tools has been much beyond the technical
management due to the ever changing world of business. Therefore every organization should
have a particular policy ready with a set of education programs that estate Cybersecurity official
should be focused on collaborations of the skill sets. Since it is been found that the Cyber
security approaches are mostly collaborative in nature, it is important that being a Cyber
information security officer call the competencies of collaboration needs to be processed and
deployed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 5
5. Increased attention of the state Cyber security officials in attending data
management issues: the collaborative nature of the state Cyber security officials with the record
manager’s archive based on the data management owners should be developed as a part of the
mechanism of a robust data management in the states (Cronin and Marion. 2016). The entire
concept of data management states that the state government is right now moving onto a control
approach for making the security work and develops this into an effective business strategy or
process (Langmia, 2016) The entire focus should be on the management of data within the
government organizations and the current environment of Cybersecurity is in constant
improvement to provide the opportunity for States to the focus on the effects which are mostly
necessary parts of narrowing the zone of production of state assets.
Research or Policy Question for Further Research
For further research of developing a policy for an organization in retaliation of the
Cybersecurity officials in state level it should be mentioned that the research should be
conducted on the research on policy question as mentioned below:
“What is the primary factor that makes faulty decision making for which the Cyber
security attacks often occur?”
Part 2:
What needs to be done and how do we get it Done
The first and foremost idea about establishing the proper Cybersecurity setup in both
private and government organizations should be done with a regulation policy that should be
followed by all the employees or workforce within the organization. The relationship of
Document Page
CYBER SECURITY 6
partnership between the government and private organizations are evaluated as a parent child
relationship but in most cases it can be found that the private sectors are having an upper hand
over the government industry due to its lack of proper implementation of Cybersecurity practices
(Moore et al., 2010). All the relevant practices that should be utilized by the organizations
lagging behind, should be specified with utility of the Cybersecurity or emergency management
policies that would reason awareness of the security information within this system and suggest a
proper way to make sure that the operations within the organization do not support the hip
recharge data and mismanagement of data.
Will a Traditional Regulatory Model Work
A traditional regulatory model in this regard would work as a stepping stone within the
establishment of a proper Cyber security policy, horrible it can be said that the policies should be
customized as per the utility and the structure of the organization (Kostopoulos 2017). Therefore
it is possible that the traditional regulatory model is utilized, but given the latest advancement of
technology, they can further meet the traditional aspects as well as the regulatory model
customized as per the organizational needs.
Does a Newer Model Need to be Developed for Uniquely 21st Century Issues
Cybersecurity is associated with information security systems within organizations.
However due to advancement of Technology exponentially increasing the potential of
information technology utilized in business it can be said that new models can be developed that
uniquely solved the issues in Cybersecurity that occur in the 21st century or the latest time
(Czajkowski & Kunreuther, 2018). With changing time the risks occurring within the
organizational setup goes through several changes and it me orchid that the traditional system
Document Page
CYBER SECURITY 7
does not comply or synchronies well with modern day problems. Therefore it is necessary that
same uniquely developed models need to be acquired by 21st century issues to make sure that the
organization uniquely solve these problems.
Whom Should the Government Regulate
The government should regulate the emergency management policies as to the
government industries. This is because the analogy describing government industry partnership
and parent child relationship is somewhat contradicting as a scenario in the latest times (Clinton,
2011). It was found that mostly the industry has actually a much bigger hold then the resources
of the parent which in this case is the government industries. It has also been seen that they are
ultimately reliant on the child or the private organizations for Cyber security. Therefore the
analytical model needs to develop an appropriate policy for the government organizations.
Research or Policy Question for Further Research
What should the government identify within the government industries to implement the
Cybersecurity/EM Analytical Model?
Conclusion
Therefore it can be concluded by seeing that Cybersecurity or emergency management
policy is absolutely necessary to identify the risk factors within an organization while taking up
any kind of new project or controlling the day today operational works and this should follow a
stated policy because the information system of the entire organization can be hampered. There
are various reasons why the data integrity loss about the information presented within the
organization has been facing various difficulties because of the increased amount of technical
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 8
anomalies. With the increased advanced technology and the excessive amount of complexities
generated within the information system of an organization, it is quite necessary that these
policies shall be mentioned and b abide by all the employees is in the organization to make sure
that all the Cybersecurity these are managed well enough before even occurring in creating
problem within the organization.
Document Page
CYBER SECURITY 9
References
Bertino, E. and Hartman, N.W., (2015, May). Cybersecurity for product lifecycle management a
research roadmap. In 2015 IEEE International Conference on Intelligence and Security
Informatics (ISI) (pp. 114-119). IEEE.
Clinton, L. (2011). A relationship on the rocks: Industry-government partnership for Cyber
defense. Journal of Strategic Security, 4 (2), 97-112. DOI:
http://dx.doi.org/10.5038/1944-0472.4.2.6. Retrieved from
http://scholarcommons.usf.edu/jss/vol4/iss2/7
Conteh, N.Y. and Schmick, P.J., 2016. Cybersecurity: risks, vulnerabilities and countermeasures
to prevent social engineering attacks. International Journal of Advanced Computer
Research, 6(23), p.31.
Cronin, K. and Marion, N.E., 2016. Critical Infrastructure Protection, Risk Management, and
Resilience: A Policy Perspective..
Czajkowski, J., & Kunreuther, H. (2018). Policy Options for Improving the Resilience of US
Transportation Infrastructure.
Deloitte-NASCIO. (2013). Cybersecurity study state governments at risk: A call for
collaboration and compliance. Deloitte and the National Association of State Chief
Information Officers.
Goodyear, M., Portillo, S., Goerdel, H. T., Williams, L. (2010). Cybersecurity management in
the states: The emerging role of Chief Information Security Officers. IBM Center for the
Business of Government.
Kostopoulos, G., (2017). Cyberspace and cybersecurity. Auerbach Publications.
Document Page
CYBER SECURITY 10
Langmia, K., (2016). Cybersecurity, Cyberculture, and Africa. In Globalization and Cyberculture
(pp. 107-113). Palgrave Macmillan, Cham.
Moore, M., Wermuth, M.A., Castaneda, L.W., Chandra, A., Noricks, D., Resnick, A.C…..
Burks, J.J. (2010). Bridging the gap: Developing a tool to support local civilian and
military disaster preparedness. 21-80. Retrieved from
https://www.rand.org/content/dam/rand/pubs/technical_reports/2010/RAND_TR764.pdf
Newsome, B.O. and Jarmon, J.A.,(2015). A practical introduction to homeland security and
emergency management: From home to abroad. SAGE Publications.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]