The Obama government was less conservative on policy but more conservative on funding, while the Trump government has transferred the burden to the private sector. However, Trump has improved the auditing process towards information development further allowing the private sector to better their ability for integrity and confidentiality, with Trump calling for more militarization (Kremer, 2014). The Trump administration has encouraged ISP firms to heighten their security levels. However, the Obama government encouraged a National Action Plan that jointly upgraded private sector security. 

The Trump government encouraged a business approach, as compared to a legal approach taking a business focus principally on a shared cost paradigm. The Federal Information Security management proposed by the Democrats government presents a more structured legal approach as compared to working with private organizations now being pursued by Trump. Accountability enjoyed significant strengths in securing servers for Federal and private level, further incorporating huge concerns of regulations. In addition, the Obama approach focused fully on compliance patterns that empower the government towards controlling how information is managed while managing risks management patterns (, 2019). 

Don't use plagiarized sources. Get Your Custom Essay on
Just from $13/Page
Order Essay

Meanwhile, ensuring more systems that are accountable promotes auditability; however, this depends fully on the ability to integrate risks management approaches. Michael and Hayden (2016) prove the command in Chief updated personnel, priorities, and policies that further shape natural security posture. The Democrats’ government utilized the Federal Information Security Act of 2002, which focused fully on accountability. Furthermore, the legal approach assures the system availability aimed at resolving challenges, while maximizing strategic risks management efforts. The risks approach further promotes infrastructure design also concerned with solving key information systems challenges. 

References (2019). FISMA Background – Risk Management | CSRC. Retrieved 24 July 2019, from

Kremer, J. (2014). Policing cybercrime or militarizing cybersecurity? Security mindsets and the regulation of threats from cyberspace. Information & Communications Technology Law23(3), 220-237. doi: 10.1080/13600834.2014.970432

Hayden, M. (2016). Military Cyber Professionals Have an Important Part to Play in the Obama-Trump Transition. Military Cyber Affairs2(1). doi: 10.5038/2378-0789.2.1.1025

Administration Policy Matrix

Current AdministrationRegulation Name and DateFour Key PrinciplesReference
Republican Government headed by President TrumpPrioritize on quality cybersecurity expenditureDouble efforts of human capital to reduce the growth of threatsMaximize auditability of the information, ensuring constant invariability promoting information sharingPromote cybersecurity integrity and confidentialityEncourage ISP firms to heighten their security levels.
Previous AdministrationRegulation Name and DateFour Key PrinciplesReference
Democrats Government, headed by President ObamaPromoted Cybersecurity National Action Plan Upgraded the Federal Information Security Management Act governing Federal Government IT security Work with stakeholders to ensure enhanced data managementPrevent data from being hacked by controlling the management of information systems through a more legal approach as compared to a business approach. Promote confidentiality and integrity Ensuring system accountability while promoting auditability
Relevant State Law or RegulationName and DateFederal Information Security Management Act of 2002 (FISMA)Four Key PrinciplesPromote confidentiality and integrity dataIntegrate advanced methods of Risks Management Ensure Availability of the system despite the challengesPromote system accountability Ensure the process can be auditedReference

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE