About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 1 (March 29, 2019)

handle is hein.crs/govyji0001 and id is 1 raw text is: 







              Congressional                                                       ____
              *Research Service






Cybersecurity: Homeland Security Issues for

the 116th Congress



March 29, 2019

Introduction

For policymaking purposes, cybersecurity can be considered the security of cyberspace. Taking this broad
view allows policymakers to examine discrete elements of cybersecurity and determine which parts to
address through the legislative process. Cyberspace, itself, includes the infrastructure necessary for the
internet to work (e.g., wires, modems, and servers), the services used via the Internet (e.g., web
applications and websites), the devices on the network (e.g., computers and Internet-of-Things devices),
and the users of those devices. Cybersecurity involves many interrelated issues, such as education;
workforce management; research and development; intelligence; law enforcement; and defense.
Recent congressional activity and Member statements suggest that five specific cybersecurity topics with
an intersection to homeland security may arise during the 116th Congress. This Insight first discusses the
importance of risk management for cybersecurity, then introduces each of those topics: Information
Sharing, Critical Infrastructure Protection and Cybersecurity, Cyber Supply Chain Risk Management,
Federal Agency Oversight, and Data Protection and Privacy.

Risk  Management
When  computer scientists refer to cybersecurity, they are generally not talking about security as an
absolute and achievable state of safety. Rather, they refer to cybersecurity as a process of risk
management. Risk can be managed in four ways: it can be avoided, transferred, controlled, and accepted.
To know the appropriate course of action, an organization must first understand which risks they face.
Risks can be understood as the threats an organization faces, the vulnerabilities they have to their
systems, and the consequences or impacts of a successful attack against them. Risks can be managed
against systems, networks, and data. In managing those risks, managers employ an infbrmation security
model to understand risk areas and tools to address risks. Policymakers could choose to examine these
risk management factors holistically, or to consider specific elements and ways to address specific risk
factors.



                                                                Congressional Research Service
                                                                  https://crsreports.congress.gov
                                                                                      IN11088

CRS INSIGHT
Prepared for Members and
Committees of Congress

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Already a HeinOnline Subscriber?

profiles profiles most