Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US

Ejiofor Oluomachi,Akinsola Ahmed,Wahab Ahmed,Edozie Samson
DOI: https://doi.org/10.29322/IJSRP.14.02.2023.p14610
2024-04-17
Abstract:This article assesses the effectiveness of current cybersecurity regulations and policies in the United States amidst the escalating frequency and sophistication of cyber threats. The focus is on the comprehensive framework established by the U.S. government, with a spotlight on the National Institute of Standards and Technology (NIST) Cybersecurity Framework and key regulations such as HIPAA, GLBA, FISMA, CISA, CCPA, and the DOD Cybersecurity Maturity Model Certification. The study evaluates the impact of these regulations on different sectors and analyzes trends in cybercrime data from 2000 to 2022. The findings highlight the challenges, successes, and the need for continuous adaptation in the face of evolving cyber threats
Cryptography and Security,Computers and Society
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to evaluate the effectiveness of current U.S. cybersecurity regulations and policies, especially in the context of the increasing frequency and complexity of cyber threats. The focus of the research lies in the comprehensive framework established by the U.S. government, especially the National Institute of Standards and Technology (NIST) Cybersecurity Framework and key regulations such as the Health Insurance Portability and Accountability Act (HIPAA), the Gramm - Leach - Bliley Act (GLBA), the Federal Information Security Modernization Act (FISMA), the Cybersecurity Information Sharing Act (CISA), the California Consumer Privacy Act (CCPA) and the Department of Defense Cybersecurity Maturity Model Certification (CMMC). By analyzing the impact of these regulations on different industries and combining the trend of cybercrime data from 2000 to 2022, the paper reveals the challenges, successes and issues that need continuous adaptation faced by current regulations and policies. ### Main problems of the paper: 1. **Evaluating the effectiveness of existing regulations**: The paper aims to evaluate the effectiveness of current U.S. cybersecurity regulations and policies in dealing with increasingly frequent and complex cyber threats. 2. **Analyzing the impact on different industries**: The research explores the impact of these regulations on multiple industries such as healthcare, finance, and government. 3. **Data trend analysis**: Through trend analysis of cybercrime data from 2000 to 2022, it reveals the changes in the cost of cybercrime, the number of data breaches and the amount of fraud. 4. **Challenges and success stories**: The paper summarizes the challenges faced by existing regulations and policies and also points out some successful cases, emphasizing the need for continuous adaptation and improvement. ### Specific problems: - **Effectiveness of regulations**: Can existing regulations effectively deal with ever - changing cyber threats? - **Industry impact**: What are the cybersecurity situations in different industries? Can regulations meet the specific needs of each industry? - **Data trends**: How have the cost of cybercrime, the number of data breaches and the amount of fraud changed in the past few years? - **Future directions**: How can existing cybersecurity regulations and policies be further improved and adjusted to deal with future threats? Through the exploration of these problems, the paper hopes to provide valuable references for policymakers and cybersecurity professionals to enhance the U.S. cybersecurity defense capabilities.