What is Cybersecurity Enhancement Act of 2009 (S.773)? - Definition from WhatIs.com

Definition

Cybersecurity Enhancement Act of 2009 (S.773)

Part of the Network security glossary:

The Cybersecurity Enhancement Act of 2009 (S.773) is United States legislation intended to improve cybersecurity within the federal government and throughout the public and private sectors. To this end, the act establishes research and development (R&D) requirements for federal agencies and promotes public-private partnerships (PPPs).

The Act requires that federal agencies conduct cybersecurity risk assessments and develop and implement R&D plans to address identified risks. Such a plan must detail objectives to be addressed in the short, medium and long terms, as well as the funding required to meet each one. The plan must also explain how the agencies’ near-term objectives complement R&D in the private sector.

The Act mandates a presidential report on the federal government’s cybersecurity workforce needs. The report will identify workforce skills needed by the government to support cybersecurity. To help build a workforce with the requisite skills, the National Science Foundation has been charged with creating fellowships and providing grants for cybersecurity-related research.

According to the Act’s stipulations, the National Institute for Science and Technology (NIST) will develop a public awareness and education plan. NIST will also establish a plan to coordinate the U.S. government’s role in international cybersecurity technical standards development.

 

Learn More About IT:
> The Committee on Science and Technology Web site summarizes the Cybersecurity Enhancement Act of 2009.

This was last updated in March 2011
Posted by: Margaret Rouse

Related Terms

Definitions

  • palm vein recognition

    - Palm vein recognition is a biometric authentication method based on the unique patterns of veins in the palms of people’s hands. Palm vein recognition systems, like many other biometric technologie... (WhatIs.com)

  • Trojan horse

    - A Trojan horse is a program that appears harmless but is, in fact, malicious. Attackers have long used Trojan horses as a way to trick end users into installing malware. (SearchSecurity.com)

  • critical infrastructure security

    - Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given n... (WhatIs.com)

Glossaries

  • Network security

    - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About Cybersecurity Enhancement Act of 2009 (S.773)Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.