Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.4.907

A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure  

Kim, Geunhye (School of Cybersecurity, Korea University)
Abstract
The purpose of this study is to understand the cybersecurity policies and critical infrastructure protection of the United States through analyzing Donald Trump's administration executive orders, the national cyber strategy, and the legislation. The analysis has three findings. First, the Department of Homeland Security (DHS) became a main agent in the cybersecurity while the role of the White House was reduced. Second, Trump's administration expanded its role and mission in the policy area by extending the meaning of critical infrastructure. Third, in the case of cyber threats, the government can be involved in the operation of critical infrastructures in the private sector. The opinions of the professional bureaucrats and DHS were more reflected in the direction of the cybersecurity policy than those of the White House. In contrast to Barack Obama's administration, the Trump administration's cybersecurity strategies were not much studied. This study provides insights for improving cybersecurity policies and critical infrastructure protection.
Keywords
Trump Administration; Obama Administration; Critical Infrastructure; Cybersecurity Policy; Department of Homeland Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Reform agenda for the department of homeland security," Forbes, https://www.forbes.com/sites/realspin/2017/01/27/reform-agenda-for-the-department-of-homeland-security/#7d416ed62a31, Jan. 27, 2017. [Retrieved from 6th April, 2019]
2 Jiyeon Yoo and Nayoung Jeong, "A study on the policy direction of critical infrastructure risk response in the changing digital environment: a comparative study of the USA's policy," Journal of Security Engineering, 14(1), pp. 59-76, 2017.   DOI
3 "NPPD, under the U. S. department of homeland security, is one of the nation's overall security officers," Boan News, https://www.boannews.com/media/view.asp?idx=58589, Dec. 13, 2017. [Retrieved from 6th July, 2019]
4 U. S. Department of Homeland Security, "Factsheet: cybersecurity and infrastructure security agency," The Department of Homeland Security: Washington, DC., 2018.
5 The White House, "Cyberspace policy review: assuring trusted and resilient information and communications infrastructure," The White House: Washington, DC., 2009.
6 Eunji Song and Wonyoung Kang, "U. S. Obama administration's second term cybersecurity policy," Internet & Security Focus: KISA, 2014.
7 "Obama's government manages cybersecurity directly," Etn News, http://www.etnews.com /200902110180, Feb. 12, 2009. [Retrieved from 6th July, 2019]
8 "Cyber-attacks against U. S. government," Digital Times, http://cyberbureau.police.go.kr/board/boardView.do?board_id=cyber&id=3593&page=15&mid=030201, Feb. 18, 2009. [Retrieved from 11th July, 2019]
9 U. S. Department of Homeland Security, "Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise," The Department of Homeland Security: Washington, DC., 2011.
10 B. H. Obama, "Executive order 13636: improving critical infrastructure cybersecurity," The White House: Washington, DC., 2013.
11 B. H. Obama, "Presidential policy directive 21: critical infrastructure security and resilience (PPD-21)," The White House, Office of the Press Secretary: Washington, DC., 2013.
12 Sangbae Kim, "International comparison of national cyber security strategies: examples of four countries around the Korean peninsula and three major European countries," Institute of International Studies at Seoul National University: Seoul, 2017.
13 "Obama's cyber legacy: he did (almost) everything right and it still turned out wrong," Nextgov, https://www.nextgov.com/cybersecurity/2017/01/obamas-cyber-legacy he-did-almost-everything-right-and-it-still-turned-out-wrong/134612/, Jan. 27, 2017. [Retrieved from 2th August, 2019]
14 "Obama's cybersecurity legacy: good intentions, good efforts, limited result," CSO, https://www.csoonline.com/article/3162844/security/obamas-cybersecurity-legacy-good- intentions-good-efforts-limited-results.html, Apr. 2, 2017. [Retrieved from 27th July, 2019]
15 U. S. Department of Homeland Security, "U. S. department of homeland security cybersecur ity strategy," The Department of Homeland Security: Washington, DC., 2018.
16 "Obama's cybersecurity plan is mean to secure his legacy," WIRED, https://www.wired.com/2016/02/obamas-cybersecurity-plan-is-meant-to-secure-his-legacy/, Feb. 10, 2016. [Retrieved from 11th August, 2019]
17 "Sidetracked: Obama's cybersecurity legacy," World Politics Review, https://www.worldpoliticsreview.com/articles/17468/sidetracked-obama-s-cybersecurity-legacy, Dec. 15, 2015. [Retrieved from 11th August, 2019]
18 D. J. Trump, "Executive order 13800: strengthening the cybersecurity of federal networks and critical infrastructure," The White House: Washington, DC., 2017.
19 "White house issues cybersecurity order," Norton Rose Fulbright: Data Protection Report, https://www.dataprotectionreport.com/2017/05/ white-house-issues-cybersecurity-order/, May. 11, 2017. [Retrieved from 2th August, 2019]
20 "Trump administration plans a new cybersecurity strategy," Boan New, https://www.boannews.com/media/viewasp?idx=57811, Nov. 1, 2017. [Retrieved from 12th July, 2019]
21 "Many DHS 'unity' initiatives to continue under 2017 NDAA," Federal News Network, https://federalnewsnetwork.com/legislation/2016/12/many-dhs-unity-initiatives-continue-2017-ndaa/, Dec. 27, 2016. [Retrieved from 12th July, 2019]
22 U. S. Congress, Public Law 114-328, "National Defense Authorization Act for Fiscal Year 2017," The US Congress: Washington, DC., 2016.
23 D. J. Trump, "National cyber strategy of the United States of America," The White House: Washington, DC., 2018.
24 "New national cyber strategy message: deterrence through U. S. strength," Government Technology, http://www.govtech.com/blogs/lohrmann-on-cybersecurity/new-national-cyber-strategy-message-deterrence-through-us-strength.html, Sep. 29, 2018. [Retrieved from 6th April, 2019]
25 The White House, "National security strategy of the United States of America," The White House: Washington, DC., 2017.
26 National Disaster Management Research Institute, "Research topics on developing the national intergrated resonse system in Korea - Focused on emergency response," National Disaster Management Research Institute: Seoul, 2009.
27 "DHS releases its cybersecurity strategy," Wiley Rein, https://www.wileyrein.com/newsroom-articles-DHS_Releases_Its_ Cybersecurity _Strategy.html, May. 16, 2018. [Retrieved from 4th August, 2019]
28 "US department of homeland security unveils new cyber security strategy," Computing, https://www.computing.co.uk/ctg/news /3032492/us-department-of-homeland-security-unveils-new-cyber-security-strategy, May. 17, 2018. [Retrieved from 4th August, 2019]
29 U. S. Department of Defense, "Cyber strategy," The Department of Defense: Washington, DC., 2018.
30 "DHS on the passage by congress of the FY 2017 NDAA (Learn More)," American Security Today, https://americansecuritytoday.com/dhs-passage-congress-fy-2017-ndaa-learn/, Dec. 27, 2016. [Retrieved from 6th April, 2019]
31 LIG consulting, "A study on the operation of the central countermeasures headquarters and establishment of the role system," The Ministry of Public Administration and Security: Seoul, 2011.
32 "A cybersecurity agenda for the 45th president," Center for Strategic & International Studies, https://www.csis.org/news/cybersecu rity-agenda-45th-president, 2017. [Retrieved from 22th December, 2018]
33 "President Trump releases national cybersecurity strategy," Becker's Hospital Review, https://www.beckershospital review.com/hospital-management-adminis tration/president-trump-releases-national-cybersecurity-strategy.html, Sep. 24, 2018. [Retrieved from 3th August, 2019]
34 "Trump launches new national cyber strategy," AXIOS, https://www.axios.com/trump-national-cyber-strategy-9b6604a1-2521-4543-8d61-64c0f785e118.html, Sep. 21, 2018. [Retrieved from 2th August, 2019]
35 U. S. Congress, Public Law 115-278, "Cybersecurity and Infrastructure Security Agency Act of 2018," The US Congress: Washington, DC., 2018.
36 "US cybersecurity and infrastructure agency: Trump signs bill to place new agency under DHS," Hashed Out. https://www.thesslstore.com/blog/us-cybersecurity-and-infrastructure-agency-trump-signs-bill-to-place-new-agency-under-dhs/, Nov. 19, 2018. [Retrieved from 5th August, 2019]
37 "The cybersecurity 202: Trump set to make a new DHS agency the top federal cyber cop," The Washington Post, https://www.washingtonpost.com/news/powerpost/paloma/ the-cybersecurity202/2018/11/16/the-cybersecurity-202-trump-set-to-make-a-new-dhs-agency-the-top-federal-cyber-cop/5bedb9a71b326b3929054867/?utm_term=.92c3b366fd3e, Nov. 16, 2018. [Retrieved from 2th August, 2019]
38 Taeyong Yoon, "Border security system and the role of national intelligence," The Korea Association of National Intelligence Studies, (6)1, pp. 85-128, 2012.
39 Sanghyun Lee, "Cybersecurity laws in the U. S.: focusing on responses from the legislative, the judicial, and the executive body," Internet and information Security, (3)1, pp. 109-131, 2012.
40 "Unity of effort key to DHS' new cybersecurity strategy," Federal News Network, https://federalnewsnetwork.com/hearings-oversight/2018/05/unity-of-effort-key-to-dhs-new-cybersecurity-strategy/, May. 15, 2018. [Retrieved from 8th March, 2019]
41 "Ali Mayorkas on leading a unity of effort at DHS," Govloop, https://www.govloop.com/community/blog/ali-mayorkas-leading-unity-effort-dhs/, Oct. 26, 2015. [Retrieved from 8th March, 2019]