Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
computer security case study
computer security case study
computer security case study
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: computer security case study
CRITICAL INFRASTRUCTURE - INFORMATION TECHNOLOGY
Executive Summary: The Information Technology Sector in the United States is an extremely complex environment supporting and interdependent between all 16 sectors. According to the department of Homeland Security, “These virtual and distributed functions produce and provide hardware, software, IT systems and services, and in collaboration with the Communications Sector the Internet” (DHS, 2014).
Problem Statement: In the United States, the Information Technology Sector has showed increased reliance on computer systems, which they have linked to almost all their vital infrastructures. Today, however, there is growing concern regarding diverse cyber security threats, which are directed towards
…show more content…
For instance, when Republicans attain majority control over the U.S. as well as the Senate, they are anticipated to face a foreign policy, which has grown increasingly complex because of heavy reliance on the Internet. In the recent years, Congress has engaged in serious programs to facilitate the adoption of reform regarding cyber security without success. Based on the growing number of attacks in the U.S., America has realized that companies and consumers are highly prone to attack by ever increasing hackers (Radvanovsky & McDougall, 2013).
Goal of Briefing: The key reason for briefing is to take a position on the issue of cyber security to reveal the potential threats it can pose to Information Technology critical infrastructure in the United Sates. It aims at seeking support for ensuring that information systems are given extraordinary support and scrutiny to eliminate any loopholes that may pose threats to the stability of the country’s critical infrastructure and consequently, collapse of the
…show more content…
Firstly, they should ensure that organizations comply with information technology regulations. Secondly, they should ensure that IT staff are well equipped with technical knowhow to ensure they can pinpoint any forms of threats and take appropriate actions in advance. Lastly, the government, private sector, and other stakeholders should share information concerning diverse forms of threats to facilitate in the establishment of effective measures for addressing any forms of security threats (Moore & Shenoi,
and their use. In Committee on Deterring Cyber attacks: Informing Strategies and Developing Options (Ed.), Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. Washington, D.C.: National Academies Press.
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation. The report titled the Cyberspace Policy Review includes strategy, policy, and standards regarding the security of and operations in cyberspace. According the white house’s cybersecurity foreign policy, the Cyberspace Policy Review highlighted two objectives and ten near-term actions to support the cybersecurity strategy.
National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.
External global threats are on the rise. Cyber-attacks against the U.S. government are notably targeted for intrusions focusing on exfiltration information some of which are attributed to the Chinese government military (Kirk, 2013). Stolen information by China may be valuable for defense and technology, U.S. policy makers in China, and military planners. (Kirk, 2013). It’s noted that Cyber warfare abilities may intercept military response operations by limiting the communication and commercial activities of an adversary. (Kirk, 2013). The DoD reports that Russia and China are playing a disruptive role within international mediums at building transparency in cyberspace, essentially because each has the technology to do so. Furthermore, both nations are pushing an Information Code of Conduct giving both governments authority over content and information over the internet, an effort that is scrutinized. (Kirk, 2013).
Data breaches have gone up significantly and hackers are coming up with innovative techniques of breaching the data security network. There are several challenges associated with cybersecurity management as there are a multitude of threats arising from various sources. Cybersecurity threat can have different levels of impact on an organization or a business and varies based on the industry type. According to the Securitas USA survey, manufacturing, healthcare and insurance, finance, information, and utilities saw cybersecurity as the topmost threat for their businesses (Securitas USA,
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
As threats evolve and change with each new technology introduced organizations will also have to strive to improve the techniques used to protect their critical Information Technology (IT) assets. Gartner's IT Key Metrics Data for 2010 which was based on a survey of companies worldwide found that a company spent 5% of their IT budget on IT Security (Kirk, 2010). Connie Guglielmo, a Forbes staff member noted that IT spending will hit $2 Trillion in 2013 and Worldwide IT spending will rise 4.6 percent this year (Guglielmo, 2013).
Also it involves the steps taken to back up and protect data at the end of each business day. We make sure that rights and procedures are followed so that only those who have access to data can view the data. However, this is based on the level of clearance our employees have. Education and training are also implemented so that each one of our staff is fully compliant with the bank policies and procedures. For example, October is national cyber security awareness month, and we are planning a number of educational awareness activities so our customers better understand our intentions and desire to work together. We have a letter going out to help customers increase their knowledge of security awareness. We also have a link to our assessment tool for our commercial clients to gauge their preparedness of cyber security. This is also to help small business owners determine if they have the right tools to protect
In today’s day and age, cyberattacks are becoming more prominent and effective in gaining intelligence, stealing private information and causing widespread personal and governmental concern. Many people have heard the term cyberattack before, but most do
Although these practices are being implemented every second of the day, a need to harness the intelligence of network and information security stakeholders is also imperative. There is a sophisticated and self-sufficient digital underground economy in which data is the illicit commodity. As a federal employee and a United States citizen, the security of both personal and professional networks is paramount. The Department of Homeland Security protects the federal networks by drawing on the Nation’s full range of resources. Moreover, it is unclear who is responsible for maintaining the security of many critical assets. Currently, DHS is working to secure the “.gov” domain, but not critical infrastructure. As President Obama stated in 2009 when unveiling his administration’s cyber security policy review, “Let me be very clear: My administration will not dictate security standards for private companies” (Obama, 2009). This is a statement of considerable importation, given that many of the missions carried out in other nations by the military (or by companies owned and managed by the state) are carried out in the by the private
It is unrealistic to imagine that the copious amount of departments responsible for cybersecurity are able to adequately protect the country; therefore, the government needs to form one department that can be responsible for all cybersecurity problems and cyberattacks. When forming this new department, resources from other groups that currently share responsibility can be moved in order to decrease the amount of resources needed for the new group. But, it is also unfathomable for the government to be responsible for all cybersecurity as “... the reality is that while the lion’s share of the cybersecurity expertise lies in the federal government, more than 90 percent of the physical infrastructure of the Web is owned by private industry” (McConnell 4). Therefore the government must collaborate with the private sector. This cooperation can be utilized to help form the new government group as “there is also an opportunity for the new agency to be formed in a more deliberate way, drawing on leadership from the private economy to promote efficiency and cost-effectiveness” (Cohen 2). By working with the private sector, the new agency can reduce costs of personnel and equipment, increase performance, and maintain diverse cybersecurity plans. Once a
Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are ...