US GOVERNMENT INFORMATION SECURITY POLICY DEVELOPMENT PROCESS

Authors

  • Aliyev Olimbek Aybekovich Researcher of Andijan State University

Abstract

From the second half of the last century, a period of radical change in the field of information security began in the United States. Since then, serious efforts have been made in the field of state computer and information security. In particular, legal-regulatory documents and legislation related to the field have been improved. The article discusses and analyzes the same issues

References

Байден подписал указ о повышении уровня кибербезопасности в стране. 13 мая 2021 г.// https://www.interfax.ru/world/765723.

Budget in brief. Fiscal year 2017 // U.S. Department Of Homeland Security 16.02.2016. URL: https://www.dhs. gov/sites/default/files/publications/FY2017_BIB-MASTER.pdf (дата обращения: 01.03.2018).

Vaida B. Warning Center for Cyber Attacks is Online, Official Says. National Journal's Technology Daily

June 25, 2003 // Government Executive. [Web-source]. URL:http://www.govexec.com/ story_page.cfm?filepath=/dailyfed /0603/062503td1.htm oref=search (дата обращения 01.05.2014)

В связи с тем, что Директива закрытая, информация получена из открытых источников. Nakashima, Ellen. Bush Order Expands Network Monitoring. Intelligence Agencies to Track Intrusions [Электронный ресурс] // The Washington Post. January 26, 2008. – URL: http://www.washingtonpost.com/wpdyn/content/article/2008/01/25/AR2008012503261_pf.html (дата обращения: 24.04.2014).

Department of Defence Directive 5105.15: Department of Defence Advanced Research Projects Agency [issued on 07.02.1958] // ARPA. [Official website] Систем. требования: Adobe Acrobat Reader URL: http://www.darpa.mil/Docs/ DARP_Original_Directive_1958_ 200807180942212.pdf (дата обращения 01.05.2014).

D.W. Jorgenson and K.J. Stiroh Raising the Speed Limit: U.S. Economic Growth in the Information Age, 2000 // O iLibrary. [Official website] Систем. требования: Adobe Acrobat Reader URL:http://www.oecdilibrary.org/oecd/deliver /fulltext/5lgsjhvj82kf.pdf;jsessionid=1nap0snalfg1l.delta?contentType=/ns/WorkingPaper&itemId=/content/workingpaper/ 5614 81176503 &containerItemId=/conten t/workingpaperseries/18151973 accessItemIds= mimeType=application/pdf (дата обращения 01.05.2014) p. 46.

Карасев П. Дж. Буш мл. - национальная оборона и защита критически важной инфраструктуры// https://russiancouncil.ru/analytics-and-comments/analytics/novye-strategii-ssha-v-oblasti-kiberbezopasnosti/.

Кибербезопасность США. Особенности стратегии.// https://spravochnikvs.com/kiberbezopasnost_ssha_osobennosti _strategii.

Леваков А. Анатомия информационной безопасности США.//http:// www.jetinfo.ru/2002/6/1/article1.6.2002.html

Мухин А. Новая стратегия национальной безопасности США – информационная бомба? / А. Мухин // Международный дискуссионный клуб Валдай. 26.12.2017. URL:http://ru.valdaiclub.com/a/highlights/strategiya-natsbezopa -snosti -ssha/ (дата обращения: 01.03.2018).

Меморандум Байдена// https://zavtra.ru/blogs/memorandum_bajdena.

National Strategy for Information Sharing and Safeguarding / The White House // The White House, 2012. URL:

National Security Strategy 2010. // National Security Strategy Archive. [Web-source] Систем. требования: Adobe crobat Reader URL: http://nssarchive.us/NSSR/2002.pdf (дата обращения 01.12.2014).

NIST IR 7298 Revision 2, Glossary of Key Information Security Terms // NIST [Official website] Систем. требования: Adobe Acrobat Reader URL: http://nvlpubs.nist.gov/ nistpubs /ir/2013/NIST.IR.7298r2.pdf (дата обращения 01.05.2014).

Public Law 89-306 (Brooks Act – with amendments) [issued on 30.10.1965] // National Institute of Standards and Technology. [Official website] Систем. требования: Adobe Acrobat Reader URL:http://itl.nist.gov/History%20 Documents /Brooks%20Act.pdf (дата обращения 01.05.2014).

Remarks by The President on Securing our Nation’s Cyber Infrastructure. May 29, 2009.

Securing Cyberspace for the 44th Presidency. A Report of the CSIS Commission on Cybersecurity for the 44th Presidency [Электронный ресурс] / Center for Strategic and International Studies. December 2008. – P. 1. – URL: http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf (дата обращения: 27.04.14)

Sulmeyer Michael. Cybersecurity in the 2017 National Security Strategy / Michael Sulmeyer. // Lawfare. 19.12.2017. URL: https://www.lawfareblog.com/cybersecurity-2017-national-security-strategy (дата обращения: 01.03.2018).

COMPUTER SECURITY ACT OF 1987 Public Law 100-235 // National Institute of Standards and Technology. [Official website] Систем. требования: Adobe Acrobat Reader URL:http://www.nist.gov/cfo/legislation/ Public%20Law% 20100-235.pdf (дата обращения 01.05.2014)

Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure [issued on 29.05.2009] // The White House. [Official website]. URL: http://www.whitehouse.gov/assets/documents/ yberspace_Policy_Review_ final.pdf (дата обращения 01.05.2014).

США увеличит расходы на кибербезопасность.13/03/19// http://www.itsec.ru/ news/ssha-uvelichit-rashodi-na-kiberbezopasnost.

Telecommunications Act of 1996 [issued on 01.02.1996] // The Federal Communications ommission. [Official website] Систем. требования: Adobe Acrobat Reader URL: http://www.fcc.gov/Reports/tcom1996.pdf (дата обращения 01.05.2014)

The DOD Cyber Strategy // U.S. Department of Defense. April 2015. URL: http://www.defense. gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf (дата обращения: 28. 02.2018).

The President of the US National Security Action Memorandum Number 252 [released on 11.07.1963] // John F. Kennedy Presidential Library. [Official website]. URL: http://www.jfklibrary.org/Asset-Viewer/mOsd6HP9gkGmqGvJhY1q A.aspx (дата обращения 01.05.2014).

The National Strategy to Secure Cyberspace [published 02.2003] // US Department of Homeland

Security. [Official website] Систем. требования: Adobe Acrobat Reader URL:иhttp://www.dhs.gov/xlibrary/assets/National_Cyberspace_Strategy.pdf (дата обращения 01.05.2014), p. 16-17 «Lead Agencies».

The President of the US National Policy on Telecommunications and Automated Information Systems Security NS №145 [issued on 17.09.1984] // ederation of American Scientists. [Official website] URL: http://fas.org/irp/offdocs/nsdd145.htm (дата обращения 01.05.2014).

The Comprehensive National Cybersecurity Initiative [2008] // The White House. [Official website] Систем. требования: Adobe Acrobat Reader URL: http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative (дата обращения 01.05.2014).

The Comprehensive National Cybersecurity Initiative. Washington, D.C.: The White House [Электронный ресурс]. – URL:http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative (дата обращения:24.04. 2014).

Хecutive Order « ASSIGNM NT O NATIONAL S URITY AN M RG N Y PR PAR N SS OMMUNI ATIONS UN TIONS» //The White House [Official website] URL: http://www.whitehouse.gov/the-press-office/2012/07/06/executive-order-assignment -national-securityand-emergency-preparedness- (дата обращения 01.05.2014).

https://obamawhitehouse.archives.gov/sites/default/files/docs/2012sharingstrategy_1.pdf (дата обращения: 28.02.2018).

Huileng Tan. China to USA: 'Stop deliberately distorting' our global strategy / Tan Huileng // CNBC. 20.12.2017. URL: https://www.cnbc.com/2017/12/20/china-us-beijing-reacts-to-trumps-america-first-policy.html (дата обращения: 01.03.2018).

9 International Strategy for Cyberspace. Prosperity, Security and Openness in a Networked World. Washington, D.C.: The White House. May 2011. – P.12 [Электронный ресурс]. – URL: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf (дата обращения: 27.04.2014).

Downloads

Published

2023-01-29

How to Cite

Aliyev Olimbek Aybekovich. (2023). US GOVERNMENT INFORMATION SECURITY POLICY DEVELOPMENT PROCESS. INTERNATIONAL JOURNAL OF SOCIAL SCIENCE & INTERDISCIPLINARY RESEARCH ISSN: 2277-3630 Impact Factor: 8.036, 12(01), 107–116. Retrieved from https://www.gejournal.net/index.php/IJSSIR/article/view/1541