Policies for Protecting Digital America and Critical Infrastructure Industries Against 21st-Century Cyberattacks

Jakob Mincey, Binh Tran

Abstract


Cyberattacks are rapidly evolving into a more sophisticated means of assault against countries, organizations, and individuals. The rapidly growing capabilities of cyberattacks, which may be conducted by either domestic or foreign malicious actors, underscores the potential devastation to a targeted nation’s institutions and its people. These attacks can be deployed against critical industries to cripple a nation’s economy, infrastructure, and citizens. Such an attack against a foreign nation could represent an act of modern warfare that equivalates to the 20th-century use of nuclear weapons. Therefore, to combat the potentially devastating cyberattacks of the 21st century, the United States government must pursue cybersecurity policies to protect its critical infrastructure industries and national security. This study seeks to determine the most effective cybersecurity policy when comparing the implementation of a white-hat hacker U.S. task force, cybersecurity regulations on critical infrastructure industries, implementation of cybersecurity awareness curriculum in K-12 public schools, and the federal implementation of a digital consumer privacy protection law. Results show that significant cybersecurity regulations targeting critical infrastructure industries represent the best policy approach for protecting those industries.

Keywords: Digital America, Cybersecurity, Cyberattack, Critical Infrastructure Industries

DOI: 10.7176/PPAR/13-4-05

Publication date:June 30th 2023


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: PPAR@iiste.org

ISSN (Paper)2224-5731 ISSN (Online)2225-0972

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org