Thursday, December 19, 2019
Essay Cyber Security Departments - 1894 Words
As the use of technology has increased drastically over the last two decades, so has our need for technology. Technology has become a part about our everyday life and we can find technology being used nearly everywhere. Most systems in todayââ¬â¢s countries and societies rely on technological infrastructure; these systems include transport systems, factory systems, power plant systems and water sanitation systems. This brings on the question of to what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security. Since these systems rely heavily on technology, governments have to consider them as high-riskâ⬠¦show more contentâ⬠¦The slammer virus managed to disable the emergency call system, the air traffic control system at some airports in the USA and the bank of Americaââ¬â¢s ATM network among other things. Cyber treats of the 21st century Computer Viruses are increasingly becoming more common, currently 148,000 computers are infected every day and the World Economic Forum predicts that there is a 10% chance for critical infrastructure being damaged in the next 5 years . As mentioned earlier most of the critical infrastructure like power plants and water treatment facilities rely on computer systems, but more specifically PLCââ¬â¢s (Programmable Logic Controllers) 2 and SCADA (Supervisory Control and Data Acquisitions System) . These control systems have a major drawback, which is that they are susceptible to attacks by hackers if they are not configured in the correct way. There have been several examples of systems being compromised. The ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) responded to 198 cyber incidents reported by power plants, water treatment plants and other critical infrastructure during 2012 . An experiment was conducted at the Department of Energyââ¬â¢s Lab in Ohio in 2 007. The aim of the experiment was to prove that it is possible to hack into the US power grid and shut down diesel generators. The experiment was called Aurora, the group of computer experts managed to hack into the diesel generator andShow MoreRelatedCyber Security And The Department Of Homeland Security3262 Words à |à 14 Pagesmemo is being addressed to you on the basis that the foreign policy issue that is threats to cyber security is of interest to the Department of Homeland Security. In brief explanation of the issue at hand, it can be concluded that the major foreign policy problem of cyber security threats has created and will continue to create imitate danger to the United States of America. The act of breaching the security sustained around private networks has become renowned as a type of terrorism, one that hasRead MoreBuilding And Maintain A Cyber Operations Force1394 Words à |à 6 PagesStrategic Goals Build and maintain a cyber operations force: The Department of Defense requires personnel to be trained to the highest standards and have the highest quality technology available to them in order to operate effectively. To this end the Department of Defense initiated the Cyber Mission Force in 2013 (ââ¬Å"Department of Defense Cyber Strategy,â⬠2015). The Cyber Mission Force is 133 cyber teams: 68 Cyber Protection teams focused on defending the network, 13 National Mission teams to defendRead MoreNational Infrastructure Protection Plan For Implementing National Preparedness1469 Words à |à 6 Pagescompanies adhere to the rules and regulations set forth in enacted bills as well as employ security best practices to limit the risk of intrusion from cyber-attacks (Li et al., 2012). The federal agencies that have the greatest amount of oversite on the power grid are the Department of Homeland Defense (DHS), The Department of Energy (DOE) and the Federal Energy Regulatory Commissi on (FERC). Department of Homeland Security DHS is tasked with creating a national infrastructure protection plan for all criticalRead MoreArticle Review : Closing The Cyber Gap1052 Words à |à 5 PagesARTICLE REVIEW: Closing the Cyber Gap: Integrating cross-government cyber capabilities to support the DHS cyber security mission, written by Edward W. Lowery. Introduction: The author of this article is Edward W. Lowery, who is apart of the U.S Secret Service. His job title is ââ¬Å"Assistant Director of the Office of Trainingâ⬠as of February 2015. Mr. Lowery was appointed Special Agent in charge of the Secret Serviceââ¬â¢s Criminal Investigative Division (CID). Before taking this position, Edward LoweryRead MoreU.s. Maritime Transportation Security Act824 Words à |à 4 Pagesseveral policies and procedures to tighten security and better secure their various waterfront terminals. These policies include, but may not be limited to: 1. Transportation Worker Identification Credential: Massport has mandated the use of the Transportation Worker Identification Credential (TWIC) and Massport Maritime Credentials for all workers entering Conley Terminal and Black Falcon Cruise Terminal. Required by the Maritime Transportation Security Act, TWIC is a threat assessment tool usedRead MoreThe Transportation Service Administration Directorate1734 Words à |à 7 Pagesfor the Transportation Service Administration directorate, which is a directorate under the department of homeland security. The main purpose of this directorate is to ensure the safety of the United Statesââ¬â¢ transport infrastructure. The main objective of this paper is to analyze the objectives of the TSA and determine whether they are in alignment with the objectives of the department of homeland security. This ensures that the directorate works towards achieving the overall goal of the DHS as stipulatedRead MoreHomeland Security1085 Words à |à 5 Pages#2 May 11, 2014 In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service effortsRead MoreCyber Security Role For Homeland Security Intelligence1153 Words à |à 5 Pagesnow and has shown major flaws within the intelligence community. Those events led the creation of the Department of Homeland Security and with it pooled federal agencies into in umbrella for it to be centralized in order to be effective. There are three categories in which the Homeland Security Intelligence face in the 21st century. Those categories are technological, political, and cyber security. In this day in age everything from critical infrastructure, government information to money is beingRead MoreCyber Security : New Law1719 Words à |à 7 PagesCyber Security: New laws in United States and Their Impact Throughout the United States today there are many attempted hacks going on right now, most unsuccessful, but some are successful. Major businesses as well as minor businesses have had to invest in a good security systems and making backups of data to protect themselves, as well as their clients, from attempted hacking and the risk of sensitive information being leaked out ( such as social security or credit card numbers). As a result, thereRead MoreEssay on The Department of Homeland Security 1208 Words à |à 5 Pagesto discuss the plan that the Department of Homeland Security has set forth for the years of 2012-2016. This plan outlines the entire vision of the department to essentially accomplish their missions and goals. The plan consists of missions varying from border security to cyber security. We must not forget the men and women on the front line working hard to ultimately secure and provide safety for the United States of America. The Department of Homeland Security National Strategic Plan was created
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.