Question
Information Memorandum to the National Security Advisor providing an overview of Bush strategy and policy documents. I will upload a introduction for you, please see that carefully. Thanks.
Answer
MEMORANDUM FOR JEB BUSH CYBERSECURITY STRATEGY
SUBJECT: Information Memorandum to the National Security Advisor Providing an Overview of Jeb Bush Cybersecurity Strategy
ORDER A PAPER LIKE THIS NOW
This document provides a summary of Jeb Bush cybersecurity strategy, and the information contained herein is directed to the National Security Advisor. Based on this information, the memo presents recommendations on the best course of action in the Presidents cybersecurity strategy. (Political Science Paper)
DISCUSSION
President Jeb bush acknowledges that the Internet is
playing a critical role in todays society by transforming peoples everyday
life and revolutionizing communications. He is also aware of the significant
contribution of the Internet towards economic growth. Yet, in President Bushs
view, this immense contribution of the Internet to the wellbeing of Americans may
be jeopardized if the most critical factor cybersecurity is not
strengthened.
The following is President Jeb Bushs five-point
plan on how Americas cybersecurity strategy should be strengthened to deter
cybercrime.
Placing a command focus on protective measures that
promote cybersecurity
The plan to adopt protective measure arises from the
reality that today America is under cyberattack and the country is unable to
keep up with the threat, yet information technology continues to expand
enormously. Many spear-phishing attacks continue to be perpetrated against
government departments, large organizations, as well as medium-sized and small
enterprises. The recommended course of action in this regard is that the
protective measures should involve the active participation of individuals,
businesspeople, and government.
Restoring accountability for cybersecurity
vulnerabilities and intrusions in the federal government
Presidential leadership should take responsibility
for the fixing of vulnerabilities within government systems by working with Congress.
Government should hire cybersecurity professionals on merit. Additionally, executive
branch officials should take responsibility for cyber intrusions that take
place within networks that are under their care. The president should ensure
that cabinet secretaries and other senior officials are not allowed to violate
laws, regulations, and procedures aimed at protecting classified government
communications. Moreover, the government should take disciplinary action
against officials who engage in reckless behavior that leads to potential
exposure of the nations secrets to cyber criminals. Thus, the recommended
course of action is that presidential leadership needs to be demonstrated through
preventive and disciplinary measures aimed at fixing vulnerability of
government systems.
Increasing U.S intelligence, enhancing cybersecurity
capabilities through law enforcement, and strengthening international
cooperation
President Jeb Bush opines that U.S. intelligence
capabilities need to be preserved and enhanced. This will enable it to succeed
in identifying, deterring and responding to cyberattacks in a timely manner.[i] The government continues
to enhance this intelligence by increasing the level of support being rendered
to the Cyber Command, the Federal Bureau of investigation as well as the
National Security Agency by giving them all the tools they require.
The President also observes that the acquisition process is also convoluted, and this leads to inefficiencies in the procurement of new cybersecurity systems. To solve this problem, the president pledges to continue supporting the acquisition reform that is ongoing in Congress.
ORDER A PAPER LIKE THIS NOW
Another area of focus for the President is the prioritization
of cybersecurity in agreement with Americas partners and allies around the
world. At this level, the country will seek to show leadership in internet
governance by maintaining oversight over international agencies responsible for
managing the cyberspace. At the same time, the President is working towards
exposing, prosecuting, and in some cases retaliating against actors who are
stealing Americas intellectual capital. Thus, the recommended course of action
is deterrence at both domestic and international levels using various
mechanisms provided for under existing legal regimes.
Creating public-private partnerships
The government must engage the private sector in
enhancing cybersecurity. It should learn from the experiences of various industries.
President is keen to mobilize resources from both public and private sectors in
enhancing cybersecurity. Other necessary actions by government include reducing
legal-technical barriers to the sharing of cybersecurity information between
public and private sectors, building best practices aimed at promoting cybersecurity
standards in the private sector, and mobilizing the political class to support
pending bills aimed at promoting the sharing of cyber-threat information
between private-sector companies and government
Removing barriers to innovation in the technology
industry
The government should focus on providing incentives
and empowering companies to promote innovation in cybersecurity. It should
avoid constraining and regulating trends in cybersecurity innovation since the
field keeps evolving. After all, such barriers are needlessly complex.
Recommended
Course of Action
Based on this summary, the recommended course of
action involves several measures, namely: presidential leadership needs to be
demonstrated through preventive and disciplinary measures aimed at fixing
vulnerability of government systems, deterrence at both domestic and
international levels is needed, legal-technical barriers to the sharing of cybersecurity
information between public and private sectors should be reduced, and
incentives should be provided to empower companies to be able to promote
innovation in cybersecurity.
END NOTES
[i] Bush, Jeb. Strengthening
Cybersecurity. September 14, 2015. Online.