• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Obama signs two executive orders on cybersecurity

September 12, 2016 by Brent Easley 7 Comments

This article is about two executive orders President Obama signed to strengthen The United States government defensed against cyber-attacks and to protect the personal information the government keeps about the citizens of the country.  The article also include information about how a budget was passed to upgrade the country’s technology, one example was how one social security department system were still using COBOL.  The article also mentions that President Obama created two new entities, Commission on Enhancing National Cybersecurity, made up of business technology, national security and law enforcement leaders and Federal Privacy Council, which will include chief privacy officers from 25 federal agencies.  These moves will be used to help the private and public sector deal with the increasing cyber security threats that companies and government deal with every day.

 

http://www.usatoday.com/story/news/politics/2016/02/09/obama-signs-two-executive-orders-cybersecurity/80037452/

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ioannis S. Haviaras says

    September 12, 2016 at 2:05 pm

    Brent,

    Great article. I also read that Obama appointed the first Chief Information Security Officer (CISO) of the federal government. This is definitely a time in which cyber crime starts to play a vital role in our national security. Cyber war crimes are prevalent by Middle East countries trying to hijack systems here in the US to gain intelligence.

    Log in to Reply
    • Brent Easley says

      September 12, 2016 at 3:20 pm

      I thought that was a great move by the President. I am glad they are taking this serious protecting the information of our citizens

      Log in to Reply
  2. Mengxue Ni says

    September 12, 2016 at 2:31 pm

    This new was all over the internet. It seems like Obama starts to pay attention on cyber crime after what happened to Hilary Clinton. For short term, they should worry about if hackers attack on election day. For long term, they need to prepared for cyber way because nowadays information is more valuable than anything else. It is great to see that president begins to consider cyber security as an important factor.

    Log in to Reply
    • Brent Easley says

      September 12, 2016 at 3:18 pm

      I agree I think it was an awesome move by the president, creating the two groups to bringing the top minds and leaders to discuss strategy on keeping our information safe

      Log in to Reply
  3. Wade Mackey says

    September 12, 2016 at 8:58 pm

    Maybe it’s just me, but asking the government to provide guidance to private industry on cyber security is suspect at best. Government systems are some of the least well maintained systems in the country. They are far behind industry on patching and hardening, and there testers often have there hands tied as they are required to use government built tools rather that tapping in the open source community. Guess we’ll see.

    Wade

    Log in to Reply
    • Noah J Berson says

      September 13, 2016 at 9:36 pm

      I think its important to look at the motivations of each organization. The new government entities will have a mission to protect data first, while in business the first mission for security will still be protecting shareholder value. Considering that we have read news of companies hiding massive data leaks often for years, it may be time to have an organization that can help. It seems like they are setting up a knowledge repository more than a regulatory body which should help some companies that can’t afford the resources of larger ones. The government is also throwing a giant pile of money at the problem which can lead to good ideas sometimes.

      Log in to Reply
  4. Jason A Lindsley says

    September 12, 2016 at 11:20 pm

    Although an executive order to modernize our systems to increase their security is a step in the right direction, this is way overdue. In 2015 the Office of Personnel Management leaked 21.5 million government employee records containing personal information. In the private sector, this would be unacceptable and organizations would be faced with hefty regulatory fines and penalties. In this case, the Director of OPM was forced to resign, but I don’t think our government officials are held accountable for security. Again, this is a necessary executive order, but this way overdue and will take years to implement.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in