Cyber federalism: defining cyber's jurisdictional boundaries
MetadataShow full item record
Cybersecurity was once a federal government responsibility because cyber had limited impact on state and local entities, but today's cyber risks to critical infrastructure and public services affect all levels of government. This thesis explores the current state of cybersecurity in the United States and examines what role each level of government--federal, state, and local--should play in protecting against and responding to a significant cyber incident. It evaluates current state and local cyber capabilities and outlines the capabilities these governments must develop to play a larger role in this growing homeland security mission. The research concludes that state and local governments should have an important role in cyber preparedness and cyber incident response, but many of these entities lack the capabilities necessary to play a meaningful role. Furthermore, current policies fail to provide clear jurisdictional boundaries between levels of government. Therefore, this thesis recommends that the nation develop a legal framework to improve jurisdictional boundaries, prioritize cyber investments at the state and local level, and improve cyber education. These steps will strengthen state sovereignty and improve the nation's cyber posture.
Systems Engineering Capstone Project Report
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-04);April 2006. Welcome to the third edition of Homeland Security Affairs. Our Spring 2006 issue features articles about intelligence and homeland security, the demarcations between homeland defense and security, and ideas ...
Achieving Better Buying Power for Mobile Open Architecture Software Systems through Diverse Acquisition Scenarios Scacchi, Walt; Alspaugh, Thomas A. (Monterey, California. Naval Postgraduate School, 2017-05); UCI-AM-17-041This research seeks to identify, track, and analyze software component costs and cost reduction opportunities within diverse acquisition life cycle scenarios for open architecture systems accommodating Web-based and mobile ...
Using Additive Manufacturing to Mitigate the Risks of Limited Key Ship Components of the Zumwalt-Class Destroyer Wang, Xiao Y.; Whitworth, James R. (Monterey, California. Naval Postgraduate School, 2017-03); SYM-AM-17-073The purpose of this project was to explore the benefits of using a combination of additive manufacturing (AM), performance-based logistics (PBL), and open systems architecture (OSA) to mitigate the risks of limited key ...