1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
12

In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose

is
Computers and Technology
1 answer:
makvit [3.9K]3 years ago
4 0

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

You might be interested in
When solving a problem in a group situation, which of the following traits should be demonstrated?
kakasveta [241]

Answer:

compromise should be demonstrated

8 0
2 years ago
_____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
ra1l [238]
I think its behavioral
4 0
3 years ago
Read 2 more answers
A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well
Gnesinka [82]

Answer:

Computer network

Explanation:

A computer network is a collection of computers and other hardware devices (such as servers, mainframes, network devices, peripherals, or other devices) linked together for the main aim of communicating with each other and sharing of resources and these resources been shared ranges from hardware, software, and even data.

8 0
3 years ago
Mrs. Golden wanted to collect baseline data on how often Lauren speaks to her neighbors during silent reading. He divided the 15
Mila [183]

Answer:

Interval Recording

Explanation:

According to my research on different data collection methods, I can say that based on the information provided within the question this method of data collection is called Interval Recording. This refers to the process of collecting different pieces of data from different parts of the same interview or study. Which is what Mrs. Golden is doing.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
4 years ago
Which are technical and visual demands that need to be considered when planning a project? Choose three answers
Marina CMI [18]

Answer: Resolution or DPI, deliverables, and file types are important technical and visual demands to consider when planning a project.

Explanation: Keep in mind whether or not the project will be published in print or on the Web.

8 0
3 years ago
Other questions:
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    10·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying?
    12·2 answers
  • The spreadsheet ends after you reach column Z and row 99. True or false
    12·1 answer
  • Assume that ip has been declared to be a pointer to int and that result has been declared to be an array of 100 elements . Assum
    9·1 answer
  • Speeding is one of the most prevalent factors contributing to traffic crashes.
    12·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Diverting an attacker from accessing critical systems, collecting information about the attacker's activity and encouraging the
    8·1 answer
  • Which are aspects of the post-production stage?
    9·1 answer
  • Why does a crane need to rotate/swivel​
    9·1 answer
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!