Integrating Federal Approaches to Post-Cyber Incident Mitigation

Abstract This article argues that the federal government lacks a cohesive approach to post-cyber incident mitigation – that is, the closing of vulnerabilities that become apparent during and after a cyber incident. To begin addressing this gap in cybersecurity capabilities, greater legal, cultural, and technological integration among the Department of Defense, Department of Homeland Security, and US Intelligence Community would be helpful in achieving a more unified strategy in post-cyber incident mitigation.

[1]  Robert Chesney Military-Intelligence Convergence and the Law of the Title 10/Title 50 Debate , 2011 .

[2]  Yacov Y. Haimes,et al.  The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions , 2011 .

[3]  J. Westby HOMELAND SECURITY VS. HOMELAND DEFENSE: GAPS GALORE , 2009 .

[4]  Austen D. Givens,et al.  Achieving Resilience in Disaster Management: The Role of Public-Private Partnerships , 2013 .

[5]  R. Dipert The Ethics of Cyberwarfare , 2010 .

[6]  William J. Lynn,et al.  Defending a New Domain: The Pentagon's Cyberstrategy , 2010 .

[7]  B. Obama Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .

[8]  Amitai Etzioni Cybersecurity in the Private Sector , 2011 .

[9]  Nathan E. Busch,et al.  Public-Private Partnerships in Homeland Security: Opportunities and Challenges , 2012 .

[10]  S. Zeadally,et al.  Cybersecurity and US Legislative Efforts to address Cybercrime , 2013 .

[11]  Richard J. Harknett,et al.  Journal of Homeland Security and Emergency Management Leaving Deterrence Behind : War-Fighting and National Cybersecurity , 2011 .

[12]  C. J. Dunlap Perspectives for Cyber Strategists on Law for Cyberwar , 2011 .

[13]  Michael Masters Committee on Homeland Security and Governmental Affairs , 2008 .

[14]  Katherine Lenane,et al.  Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities , 2011 .

[15]  Eric A. Fischer Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions [November 9, 2012] , 2012 .

[16]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[17]  Jeffery K. Toomer A Strategic View of Homeland Security: Relooking the Posse Comitatus Act and DOD's Role in Homeland Security , 2002 .

[18]  Richard J. Harknett,et al.  The Cybersecurity Triad: Government, Private Sector Partners, and the Engaged Cybersecurity Citizen , 2009 .

[19]  David M Hollis USCYBERCOM: The Need for a Combatant Command versus a Subunified Command , 2010 .

[20]  Alice R. Buchalter Military Support to Civil Authorities: The Role of the Department of Defense in Support of Homeland Defense , 2007 .

[21]  Charles Doyle The USA PATRIOT Act: A Sketch , 2002 .

[22]  Nathan E. Busch,et al.  Realizing the promise of public-private partnerships in U.S. critical infrastructure protection , 2013, Int. J. Crit. Infrastructure Prot..

[23]  Audrey Guinchard,et al.  Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy , 2011 .

[24]  G. McGraw Cyber War is Inevitable (Unless We Build Security In) , 2013 .

[25]  A. Schneider,et al.  Behavioral Assumptions of Policy Tools , 1990, The Journal of Politics.