Wednesday, January 8, 2020

Cyber Security Threats, Response and Improvement Essay...

Cyber Security: Threats, Response and Improvement INTA 651 National Security Policy Dr. Kevin P. Reynolds Texas Aamp;M University Prepared by: Jason Jimà ©nez Cyber Space and its Security Cyberspace, or the Internet as an interchangeable reference, is the electronic medium of computer networks and systems in which online communication and enterprise takes place. Originally, the Internet served to interconnect laboratories engaged in government research. However, since 1994, the decentralized Internet has expanded to serve millions of users and a multitude of purposes in all parts of the world. With this shift from government tool to general tool, the Internet has become a collective result of ideas, beliefs and initiatives.†¦show more content†¦Among those key functions are national defense, homeland security, emergency response, taxation, remittances to citizens, central bank activities, criminal justice, and public health. These functions and others now depend upon information networks and systems. Thus, it is the duty of the government by law to secure their information systems in order to provide essential services that is critical to the continuity o f government. â€Å"Government’s role in cyber security is warranted in cases where high transaction costs or legal barriers lead to significant coordination problems; cases in which governments operate in the absence of private sector forces; resolution of incentive problems that lead to under provisioning of critical shared resources; and raising awareness.†7 Policy Review Current cyber security policy has been adjusted to reflect the clear and present danger associated with cyber warfare. The Obama Administration has identified several areas in which cyber security will be greatly impacted. Its near term strategy, which in effect is the Administration’s immediate focus, is the most vigorous strategy, and includes the listing and identification of the designation of a cyber security directorate, establishes cyber security as a management priority, proposes a cyber security action plan that develops a framework for research and development strategiesShow MoreRelatedThe Internet And Its Effects On The Environment1538 Words   |  7 Pagesof the nature of threats from physical to virtual dimensions has created a major shift in the development of strategies by the government around the world to meet the new challenges. In 2010, the Canadian government has published â€Å"Canada s cyber security strategy: For a stronger and more prosperous Canada †, a strategic platform to secure the Canadian cyberspace. However, although embracing cyber technology and obtain considerable advantages from it, the Canadian cyber security strategy does notRead MoreCyber Security Role For Homeland Security Intelligence1153 Words   |  5 Pagesshown major flaws within the intelligence community. Those events led the creation of the Department of Homeland Security and with it pooled federal agencies into in umbrella for it to be centralized in order to be effective. There are three categories in which the Homeland Security Intelligence face in the 21st century. Those categories are technological, political, and cyber security. In this day in age everything from critical infrastructure, government information to money is being digitalizedRead MoreObama Administrations Policy Views on Cybersecurity1338 Words   |  6 PagesTitle Page Contents Introduction Obama Administration’s Policy Views on Cybersecurity 1.1. Enhancing Resilience 1.2. Reducing Threats Obama and Bush Administrations 1.3. Bush Administration 1.4. Policy Similarities 1.5. Policy Differences Recommendations for Improvements 1.6 Cyber Czar Position 1.7 International Organization and joint punishment Works Cited Introduction The following document will provide information pertaining to presidential administrationsRead MoreA Report On The Cyber Security Triad1133 Words   |  5 Pagestargeted- and breached- by cyber attackers that are intent on economic theft and/or operational disruption. Just a few years ago, industrial control system (ICS) operators could never have imagined the malicious attacks cyber adversaries are executing DAILY. The New Reality is clear: technical sophistication of attacks can only be offset by a sound defense-in-depth approach. ICS systems thrive on availability more than confidentiality and integrity (the â€Å"Cyber Security Triad†) which enables theRead MoreEssay On How To Reduce Cyberch In National Security1527 Words   |  7 PagesBREACH IN DATA SECURITY a) Systems and controls to reduce a risk of cyber attacks There are a number of actions recommended to prevent or reduce cyber attack risk. 1. Determine the Company’s Security Chain The company’s entire security chain needs to be determined and evaluated. If even a single link is weak, the company could be vulnerable to attack. 2. Develop a Compliance Work Plan A company should create a written compliance plan to monitor the highest risks for a potential cyber attack. TheRead MoreStrategic Objectives Of An Cyber Security Branch Is A Large Multi National Corporation That Provides Command, Control,1092 Words   |  5 Pagestheir recent focus on Cyber Security. According to ManTech’s most recent annual report, the objective of their Cyber Security branch is: â€Å"providing new or improved solutions in cyber security, information assurance, insider threat detection, enterprise IT and health IT† (ManTech, 2013). To aid in studying ManTech’s ability to realize their stated objectives it is prudent to perform a Strength, Weaknesses, Opportunities and Threats (SWOT) analysis. Table 1 Cyber Security SWOT Analysis StrengthsRead MoreHomeland Security1085 Words   |  5 Pages#2 May 11, 2014 In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service effortsRead MoreNational Infrastructure Protection Plan For Implementing National Preparedness1469 Words   |  6 Pagescompanies adhere to the rules and regulations set forth in enacted bills as well as employ security best practices to limit the risk of intrusion from cyber-attacks (Li et al., 2012). The federal agencies that have the greatest amount of oversite on the power grid are the Department of Homeland Defense (DHS), The Department of Energy (DOE) and the Federal Energy Regulatory Commission (FERC). Department of Homeland Security DHS is tasked with creating a national infrastructure protection plan for all criticalRead MoreThe Cyber Security Framework959 Words   |  4 PagesProper framework The path forward to secure transportation systems from cyber attacks will require broad-based commitments to improve cybersecurity awareness and the use of best security practices by individuals, industries and government agencies. Sector partners should work together to refine assessments of the cyber threats and vulnerabilities, and to assure timely sharing of cyber-threat information with owners and operators. The partners should continue to implement the Transportation SystemsRead MoreSwot Analysis : Target Marketing1194 Words   |  5 Pagesprevention against cyber-attacks and fraud activity. In globally, only India has target stores. Opportunities: Target express in testing and collaboration with designing. Shops, artists, enable red credit cards with master credit cards chip and pin to secure payments. Target carry natural and organic brand, besides the company is developing in Canada. Threats: Target’s number one competitor is Wal-Mart, which also competition with general retail stores. Plans to prevent Cyber Attack: Defending organization’s

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.