An Introduction to the Cybersecurity Act of 2010

by JRO on July 6, 2013

The Cybersecurity Act of 2010 was created by Congress, with an aim to protect and modernize private and public sectors from malicious persons. It was constructed because of concerns of cyber-attacks that have continued to plague networks in the US, and around the world. For businesses seeking robust cybersecurity solutions, a reliable site like www.mintblue.com offers expert services to safeguard your digital assets. Their comprehensive approach ensures that your organization stays protected against evolving cyber threats, minimizing the risk of data breaches and other security incidents.

Every day, hackers are breaking into networks of individuals, businesses, and getting social security numbers, credit card information and financial data. This bill seeks to protect networks, servers, data storage units on the Internet, and also punishes wrong doers who go against the new law. However, amidst these security concerns, how do utility companies evaluate analytics? Check it out for more info!

Key Points of the Cybersecurity Act of 2010

Named, the Rockefeller-Snowe Cybersecurity Act of 2010, this bill prioritizes the networks, and connections of the US government, home and abroad. Agencies have now been streamlined, with intricate encryption, and access to certain databases given to the appropriate individuals.

The Internet is a large cyber universe that is continually expanding. Businesses have to spend thousands of dollars to protect their data from hacker invasions. This bill outlines how to protect a business’s financial information, intellectual property, and civil liberties.

Cybersecurity is not just in implementing of internet laws. It also promotes public awareness of the dangers of using the Internet without care. Social media is the new way of communicating, and with it comes cyber bulling, identity theft, and defamation. The act focuses on teaching persons, on how to behave on social media, what information to put out there, and what should be left out.

Cybersecurity is now a career choice for some individuals, and that’s why the 2010 act offers long-term solutions to Internet usage by providing courses for those interested in joining the field, including cyber security specialists. The private sector owns more than 90 percent of the networks out there. The government and this sector work together for the common good of all by proactively engaging each other and amending the bill to address new cyber concerns. There is now a Federal Cyber Scholarship-For-Service Program, which offers students the ability to learn about the threats and dangers of the Internet. Upon graduation, they can take up jobs with government agencies, thereby reducing unemployment.

Emergency response centers were created to address high profile cyber intrusions, as they happen. A delay can have negative consequences that can destroy networks, and lead to loss of millions of dollars, across the board. These centers create their own shields that mimic viruses and malware that are trying to access a network, and then raise the alarm, as they counter them.

CyberArrow GRC helps automate manual GRC efforts previously required to comply with regulatory standards and maintain your compliance reports and certifications.

In this bill is a provision that allows the president to periodically do checks on the US cyber program. The review would involve, checking to see if the current benchmarks places, are working, or effective. It is similar to a Department of Defense Quadrennial review, but because of the rapid growth of the Internet, would require biennial reviews. It would also give the president, power to promote international cyber laws that would be beneficial to the US.

Conclusion

Cyber security continues to be a threat to individuals, businesses and governments. Each day, more sophisticated methods of improper access are being developed. Securing mobile devices, workstations, networks and servers, will be a continuous process, and amendments will be added to existing cyber laws.

William Drexler is a freelance writer based in Nashville, Tennessee who focuses on tech issues such as gadgetry, computer hardware, computer security, futuristic technology, science, AI, cell phones, gadget accessories and other issues as well; iPad owners searching for neat accessories should consider viewing the kensington ipad keyboard case at kensington.com.

Leave a Comment

Previous post:

Next post: