1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
3 years ago
12

In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose

is
Computers and Technology
1 answer:
makvit [3.9K]3 years ago
4 0

Answer:

The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.

12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)

Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.

Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.

Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.

Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.

Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.

Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:

Explanation:

You might be interested in
Two dimensional area with a recognizable boundary is called what?
vichka [17]
A two dimensional area with recognizable boundary is called a shape
3 0
2 years ago
Hannah receives an email from Keith, a subordinate who is about to start analyzing a market research report. Keith has never don
Oduvanchick [21]

Answer:

by writing her answers to the questions as a numbered or bulleted list

7 0
3 years ago
Select the correct answer. Joe always misspells the word calendar. He types the word as calender but the correct spelling appear
vivado [14]
The answer would be A.)
6 0
3 years ago
Which tab should you click if you want to access the Show All Comments option in a worksheet?
Lostsunrise [7]

Answer: Review

Because you want to review the comments

3 0
2 years ago
Read 2 more answers
Consider the following code segment in which the int variables a and b have been properly declared and initialized.
Amanda [17]

Answer:

a and b should both be declared and initialized

Explanation:

The code checks

i - if a is less than b; a should be incremented by 1

ii - if b is less than a; b should be incremented by 1

iii - if none of the two conditions were met; both a and b get incremented by 1

8 0
3 years ago
Other questions:
  • Describe software as a service. what features distinguish it from application software installed on a personal computing device
    11·2 answers
  • Once Google Analytics processes data, it’s stored in a database where it can’t be modified.
    9·1 answer
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • The color pattern in which marine organisms are light on the bottom and dark on the top of their bodies camouflaging them agains
    11·1 answer
  • What is the first computer ever made?????
    9·2 answers
  • Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
    5·1 answer
  • What are Layers in computer class 7. no scams please​
    9·2 answers
  • Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool
    15·1 answer
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    8·1 answer
  • _________ is the most popular high-level Java API in Hadoop Ecosystem. Cascading Scalding Cascalog None of the options
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!