Exploration of Cyber Security as a Public Good

Exploration of Cyber Security as a Public Good

Exploration of Cyber Security as a Public Good

1) How can government justify telling private industry how to set up or improve their cyber security?
“President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter” (U.S. White House Office, 2010). Today, more than ever, society is dependent on cyberspace to accomplish many aspects of our daily lives. We utilize computer networks to ensure America’s economic competitiveness through e-commerce, the stock exchange and numerous other methods. Along with using the network for economic gain; “We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control” (Obama, 2009). The security of our digital infrastructure is therefore paramount for economic prosperity, public safety and national security. The proper securing of the infrastructure is a daunting, never ending task; especially considering a large majority of the digital infrastructure is owned and operated by the private sector.
Therefore, who has responsibility to secure this infrastructure? According to President Obama, “My administration will not dictate security standards for private companies.  On the contrary, we will collaborate with industry to find technology solutions that ensure our security and promote prosperity” (Obama, 2009). Although the current administration will not dictate security standards to private industry, it has a responsibility to ensure the protection of the national digital infrastructure.
Generally the government tries to stay out of the business of private companies. However there are a few areas in which the government is justified in dictating the cyber security of a private industry. According to the National Strategy To Secure Cyberspace, “ Federal actions to secure cyberspace...

Similar Essays