Proceedings Of The Marine

SPR 2014

Proceedings magazine is a communication tool for the Coast Guard's Marine Safety & Security Council. Each quarterly magazine focuses on a specific theme of interest to the marine industry.

Issue link: https://uscgproceedings.epubxp.com/i/284910

Contents of this Issue

Navigation

Page 57 of 85

55 Spring 2014 Proceedings www.uscg.mil/proceedings Securing our cyber borders is a highly collaborative and systemic process that involves implementing good cyber "hygiene" for all who use these systems includ- ing government entities, the private sector, and private citizens. Broadly speaking, there are non-technical and technical cyber security approaches. Non-technical cyber security approaches include: • safeguarding passwords, • not reusing passwords, • resetting default passwords. Technical cyber security approaches involve: • employing cyber security practices during cyber product engineering and manufacture, • installing firewalls and antivirus/antispyware software, • installing intrusion detection software. U.S. Cyber Security Strategy On February 12, 2013, President Obama issued Execu- tive Order 13636 to improve critical infrastructure cyber security and Presidential Policy Directive 21 to improve critical infrastructure security and resilience. Key points include: • developing a technology-neutral voluntary cyber security framework; • promoting and incentivizing cyber security prac- tices; • increasing the volume, timeliness, and quality of cyber threat information sharing; • incorporating privacy and civil liberties protections into initiatives to secure our critical infrastructure; • developing situational awareness that addresses physical and cyber aspects of how infrastructure is functioning in near real-time; • understanding cascading consequences of infrastruc- ture failures; • evaluating and maturing public/private partnerships; • creating a comprehensive research and development plan. Cross Border Cyber Security Strategy As there is a vast amount of infrastructure that the U.S. and Canada share and, in keeping with the rich history of international collaboration between the countries, the U.S. president and Canadian prime minister established Beyond the Border: A Shared Vision for Perimeter Security and Eco- nomic Competitiveness. 1 This fve-part action plan outlines the approach that the U. S. and Canada will take to ensure the economic prosperity of both parties. 1. Address threats early 2. Facilitate trade, economic growth, and jobs 3. Cross-border law enforcement 4. Critical infrastructure and cyber security 5. Manage our long-term partnership Part four, in particular, contains measures intended to pro- mote rapid response and recovery for disruptions to our shared infrastructure. This will require enhancing exist- ing bilateral cyber security agreements to protect the cyber infrastructure and our joint response to cyber incidents; strong collaboration with the private sector, critical infra- structure owner/operators; and real-time international information sharing. Canadian Cyber Security Strategy Our neighbors to the north have developed a cyber security strategy that focuses on three pillars and their underlying goals. Securing government systems establishing clear federal roles and responsibilities, strengthening federal cyber system security, enhancing cyber security awareness throughout government. Partnering to secure vital cyber systems outside the federal government partnering with the provinces and territories, partnering with the private sector and critical infrastructure sectors. Helping Canadians be secure online combating cyber crime, protecting Canadians online. KevinAlexanderGeorge / iStock / Thinkstock Spring2014_26.indd 55 3/26/14 2:07 PM

Articles in this issue

Links on this page

Archives of this issue

view archives of Proceedings Of The Marine - SPR 2014