Advances threats. This is why an approach

Advances in the microelectronics technology recently have encouraged a rapid growth in the supply of information processing services and telecommunications throughout the country: within the government and the private sector. This trend promises great efficiency but also great dangers especially on security challenges such as unauthorized electronic access, and hostile related threats. This is why an approach must be reached to be able to cub such situations; one that includes providing initial objectives, policies, an organizational structure for guidance, establish a mechanism for policy development, and assign responsibilities for implementation.ObjectivesThe security of this system in the national level is quite immense meaning that channels used to convey national information, other sensitive government related details, and some private sector highly classified details are key national responsibilities. First, there should be a reliable means that assesses the threats and vulnerabilities and tackle them appropriately, and effectively. Second, there should be a superior technical base within the government and areas of high value information in the private sector to be able to look out for threats or warnings. Third, there should be involvement of the private sector in adoption of security initiatives. Fourth, support and consistent improvement of other objectives must to be done regularly. PoliciesSome polices were established to support the objectives. One was that the systems generating, transferring and storing information should be secured necessarily to avoid exploitation or compromise. Another was, those systems that carried relatively important information were to be proportionally treated as so. Also, the government shall advice and assist the private sector in protecting its communications from temperance if need be. Finally, efforts and other programs begun under PD-24, which support these policies, shall be continued. The implementation was to be done by a senior steering group at the operating level to implement the policies and objectives.Systems Security Steering GroupThe group consists of the Secretary of State, the Secretary of the Treasury, the Secretary of Defense, the Attorney General, the Director of the Office of Management and Budget, the Director of Central Intelligence, and chaired by the Assistant to the President for National Security Affairs is established. One of its responsibilities is to oversee and ensure proper implementation. Second, monitor activities and offer guidelines on activities according to the objectives. Third, review and evaluate the security status consistently. Fourth, review budget proposals for the system. Finally, review in aggregate the budget for the system in departments and government agencies. The National Telecommunications and Information Systems Security CommitteeThe NTISSC is established to operate exclusively under the Steering Group to maintain technical matters and develop operating policies as seen fitting. The committee’s roles were clear and precise. Develop specific operating policies required for implementation. Also provide information on communication to department agencies. To submit annually to the Steering Group a review assessing the status of national security. Also, identify systems in the private sector handling sensitive information while advising and encouraging of the same. The Executive Agent of the Government for Telecommunications and Information Systems SecurityThe Secretary of Defense shall serve as the head of this unit, which is responsible for implementing policies developed by the NTISSC. This means ensuring the development of plans and programs set to achieve necessary security architectures, process for and provide to all involved units technical assistance, and other commonly related services, approve and provide minimum security standards consistent with the Directive and conduct, endorse or approve research and development of techniques for communications.The National Manager for Telecommunications Security and Automated Information Systems SecurityThe National Security Agency is the Director of the unit. Some of its responsibilities include examining government telecommunication systems and evaluating their vulnerability to interception and exploitation, act as the focal point for the government for cryptography and automated information systems, conduct, approve, or endorse research and development of equipment and techniques for the systems, and review and approve all standards and equipment for telecommunications and automated information systems. The Heads of Federal Department and AgenciesSome of their responsibilities include being responsible for attaining and maintaining a secure parameter to the systems within the agencies, ensure that standards, doctrines and policies issued are implemented within their departments accordingly and, provide to the Steering Group, the NTISSC, Executive Agent, and the National Manager, as appropriate, such information as may be required to discharge responsibilities to appropriate sectors.ConclusionThe acts and different procedures set in place were in order to cub and adjust communication systems from exploitation from foreign groups especially terrorist groups. This was important since the communication means were rapidly growing and changing. In order to be able to cub and handle that, the U.S. Government formed groups and units to cub this, also preaching and assisting the private sector in carrying out similar efforts.