Week 8 - Final Project

doc

School

University Of Arizona *

*We aren’t endorsed by this school

Course

524

Subject

Information Systems

Date

Nov 24, 2024

Type

doc

Pages

35

Uploaded by ChancellorFlowerOctopus27

Report
1 Running Head: CYBER SECURITY Upper Iowa University PA-25-3A-71 Leadership Issues/Critical Incidents Week 8 – Final Project Cybersecurity
Cyber Security 2 Abstract for Milestone I: Theoretical Foundations Over the past few years, the sophistication of cyberattack has grown tremendously, and constant attention is required to protect data and personal information, and also to safeguard national security. Cybersecurity is to detect and eliminate digital spying as the top threat to national security. Cyberspace is difficult to secure because of the number of factors involved, and the ability to act and operate maliciously anywhere in the world. The purpose of this research is to share the sophistication of cyber actors in exploiting vulnerabilities to steal banking information, data, disrupt, destroy, or threaten essential services. Also, to provide details on preventing, protecting, responding, recovering, and building security to ensure resilience against cybercrimes. Abstract for Milestone II: Professional Considerations In this section of the research, key professional authors and valuable articles on cybersecurity describe how the world has become more interconnected today than ever, and how the Department of Homeland Security (DHS) and other agencies are working together to impact and defeat cyber criminals from theft, abuse, fraudulently obtaining personal information, and threatening the security of the country. Also, how the Department of Homeland Security have developed and implemented special divisions that include the United States Secret Service, the United States Immigration and customs Enforcement (ICE) and other programs focusing on combating cybercrimes.
Cyber Security 3 Abstract for Milestone III: Application Cybersecurity protection is important now and in the future of the cyber world, and as the world is inhabited by the network systems, the security is considered liquid and malleable in the cyber world. It is important for the government, businesses and individuals to realize and remember the amount of information stored and shared on the internet that cyber criminals can easily retrieve. Cyber security is important and necessary to protect this information from cyber criminals based on their advancement.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 4 Table of Contents Milestone I – Cyber Security Purpose ……………………………………………… 5 Theorists to Research for this Assignment………………………………….5 Discuss a topic across the theorist………………………………………….. 6 How does this topic relate to my area of special interest? ………………… 6-7 How does the topic relate to the course objectives? ………………………. 7 What questions would I like to have answered in this knowledge area? ….. 7 What patterns or common theme emerges from these theorists? …………. 7 What makes each writer different from the others in the field? …………… 8 Milestone II – Annotated Bibliography …………………………………………….. 9-20 Literature Review…………………………………………………………… 21 Milestone III – Project ……………………………………………………………… 22-28 Reflection …………………………………………………………………... 29-33 References…………………………………………………………………………… 34-35
Cyber Security 5 Milestone 1 – Cyber Security Purpose Incidents including network outages, computer viruses, and network outages affect people lives and businesses, ranging from inconvenience to life-threatening. Opportunities and exploitation for hackers increase as mobile users, digital application and data network increases. Cyber security is known by many people as information technology security and focus on protecting networks, computers, and data from hackers, destruction, or unintended changes. Most businesses and the government use computers for collecting, processing, and storing a large amount of data and information and transmitting to other networks or other computers. The cyberattack sophistication has grown in volumes, and ongoing attention is required to protect information as well as safeguarding national security. Cyberattacks and digital spying is the top threats to national security, eclipsing terrorism (Bucci & Inserra, n. d.). Theorists to Research for this Assignment The theorists to research for this assignment include Henri Fayol, who theorizing regarded administration and what worked well for the organization. Fayol promoted a persistent set of principles that organizations should apply to operate properly (managers-net.com). It is important that the Department of Homeland Security (DHS) have a cyber security program in place to protect business and individuals finances and data. Abraham Maslow described five goals that cannot be implemented until the previous goals are implemented. Physiological such as hunger, sleep, shelter, security, freedom from attack, were included in the goals. Maslow’s goal is to provide a useful insight into understanding and managing security (gdufs.biz).
Cyber Security 6 Discuss a topic across the theorist Managing and understanding security could be as simple as layering physical, administrative, and technical control types based on dependency. A possible argument is that physical security is a basic requirement for protecting information. The layers consist of administrative policies and standards and procedures that oil the security management wheel. The benefit of using this approach is to assist the technical security team in focusing on considering the physical and administrative aspect of security before a technical solution is deployed. Another option is to design the control group consisting of detective, preventative, deterrent, and corrective in a hierarchy triangle to prevent negative things from happening. This option is better than an option consisting of picking up the pieces after an event or disaster. Therefore, using a proximity card as a preventive control could be considered a necessity (Clayton, 2010). How does this topic relate to my area of special interest? The topic relates to my interest in the Department of Homeland Security’s vision of ensuring America is safe, secure, and volatile against terrorist and hazards. The DHS foundation is based on these three concepts that form the national homeland security foundation strategy in designing and achieving its mission. Also, these three key concepts drive broad activity areas processed by the Quadrennial Homeland Security Review (QHSR) that define the mission of homeland security (Clayton, 2010). The mission and their objectives provide details on the meaning of preventing, protecting, responding, recovering, and building security, ensuring resilience, and facilitating customs and exchange. People across the state, local, and federal government, the private sector, and non- governmental organizations share the responsibility of executing these missions. These people
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 7 regularly interact with the public with the responsibility of providing safety and security of our nation. Also, they perform research and develop technology, prepare, and respond to threats and disasters. They have a clear sense of what is involved in achieving the overarching vision (Clayton, 2010). How does the topic relate to the course objectives? The topic is relevant to the course objectives that include identifying and discussing concepts and theoretical approaches to managing a disaster response. It includes differentiating between ordinary operational management and leadership during crisis situations, evaluating the roles and responsibilities of governmental and non-governmental agencies in supporting the National Response Framework, understanding the NIMS and ESFs functions. Also, included is analyzing emergency operations involving multi-jurisdictional response agencies (uiuonline.com). What questions would I like to have answered in this knowledge area? 1. Should the Department of Homeland use the layered approach to security the nation from cyberattacks? 2. Are there any loop holes in the layered approach that can make it difficult for hackers to hack into computers? 3. Will the prevention system automatic shut off computers left on? What patterns or common theme emerges from these theorists? Both theorists Abraham Maslow and Henri Fayol focus is issue problem-solving and success in life. Maslow’s focus is security hierarchy and that life is built on layers of according to the dependent needs with the self-fulfillment needs as the top layer and the physiological needs as the bottom layer. Henri Fayol focus is management theory on interacting with personnel and that management should interact with personnel in planning, organizing, commanding, coordinating, and controlling.
Cyber Security 8 What makes each writer different from the others in the field? Henry Fayol is the contributor of modern management concepts and his management concept was significant to most researchers who followed his pattern. Also, he contributed to organizational management practices and theory and claimed that focusing on management practices misunderstandings may be minimized, and the organization’s efficiency could increase. Abraham Maslow intent was never to be in management but based his theory on security hierarchy and the hierarchy of human needs. I believe that more focus should be placed on Maslow’s ideas because they could apply in the 21 st century. Safety and security consist of knowing danger is not present, and knowing care and protection is there no matter what.
Cyber Security 9 Annotated Bibliography Singer, P. W. & Friedman, Allan. Cybersecurity and Cyberwar. (April 01, 2014). Network Security, 2014, 4, 4. The purpose of this article was to inform the reader of cybersecurity and how a poor understanding of cyber threats or ignorance can cause unwanted consequences. Both businesses and individuals may be reluctant in realizing the benefit of technology and fear their information may get in the hands of criminals and sold. They may engage behaviors that cause risk and result in inconveniences to disasters, in the process of adding to the cyber anxiety culture felt (Singer and Friedman, 2014). Today, cybercrimes are well-established, and the convenience for criminals to make money selling the stolen data. The government agencies, security, and businesses are seeking to gauge the scale and cost of cybercrimes attacks. Some agencies try to gauge the cybercrime impact globally, whereas others try to quantify the impact by focusing on a specific geo-political region (Singer and Friedman, 2014). Cybercrime is a problem widely recognized, and any attempts to gauge this type of crime results in various numbers based on the scale, cost, and effect of such attacks. Singer and Friedman (2014) indicate that the infrastructure of cyberspace is vulnerable to a variety of risks from cyber threats to hazardous. Cyberspace is difficult to secure because of the factors involved and the malicious actors’ ability to operate from different parts of the world. Also, according to the author, the growing concern of cyber threats to critical infrastructure has become a major concern, as technology become integrated with physical operations infrastructure, the risk increases on a wide scale with high-consequences that could cause harm or disrupt services our lives depend on. He argued that a variety of crimes are perpetrated
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 10 through cyberspace and have caused human and economic consequences, and sophisticated cyber actors exploit vulnerabilities and capable of disrupting, destroying, or threaten essential services. Critical Analysis Singer and Friedman (2014) stated that the world today is more interconnected than ever, and with its advantages come increased risk, fraud, theft, and abuse. The Department of Homeland Security (DHS) and other agencies work together to impact and defeat cyber criminals and to develop standardized methods of investigating cyber incidents. The DHS have special divisions such as the United States Secret Service, the United States Immigration, and Customs Enforcement (ICE) focus is to combat cybercrimes. Value of Article This article should be read by both business and individuals to inform them on how the DHS use hazardous approaches to safeguard cyberspace critical infrastructure. The DHS coordinates with other agencies and private sectors to share information on vulnerabilities and cyber threats to fully understand the infrastructure system interdependency nationwide. The approach used by the DHS is to protect, prevent, mitigate, and recover from cyberattacks. He suggested results of this study indicated that modifiability of government agencies and businesses has to seek ways to combat cybercrimes and ways to protect data and people private information. The government, both large and small business, and individuals will gain value from the article. Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Preservice
Cyber Security 11 Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a Difference. Journal Of Digital Learning In Teacher Education (International Society For Technology In Education) , 28 (2), 83-88. Summary The purpose of this article was to discuss cyber safety and framework for protecting critical infrastructure as a major priority for our nation. In 2013, President Obama signed an Executive Order to improve cybersecurity critical infrastructure (Pusey and Sadera, 2011). According to the author, a major component of the Executive Order was developing the National Institute of Standards and Technology Cybersecurity Framework to assist critical infrastructure sectors in reducing and managing cyber risks regardless of the sophistication or size of cyber security. The framework of cybersecurity can be used in aligning cybersecurity decision with mission objectives, organizing security requirements that originate from legislation, policy, regulation, and industry best practice. The framework of cybersecurity was communicating its requirements with stakeholders, partners, suppliers, and to integrate cybersecurity activities with civil liberties risk management. Pusey and Sadera (2011) argument was the cybersecurity framework was considered a living document and will be constantly updated and improved with feedback from industries. As the cybersecurity framework is practiced, experiences and lessons will be integrated into the future framework. The authors indicated that the experiences would ensure the critical infrastructure owners and operator needs were met and become a challenge to environments of new risks, threats, and solutions (Pusey and Sadera, 2011). Critical Analysis
Cyber Security 12 According to Pusey and Sadera (2011), The Department of Homeland Security will continue serving as a leader in assisting with aligning critical infrastructure with resources to use with the framework for managing cyber risks. They argued that when an incident occurs affecting the critical infrastructure and required coordination between owner and operators of the critical infrastructure of the nation, the National Infrastructure Coordinating Center (NICC) would serve as the hub for sharing information for supporting the security and resilience of the vital assets. The NICC would share both cyber security and physical security information for enhancing efficiency and effectiveness of the United States government in securing critical infrastructure. Value of Article This article should be read by both individuals and businesses as they gain knowledge of cybersecurity. The article discusses dealing with the interconnection of cybersecurity and physical security, and how the DHS became partners with the critical infrastructure community in establishing a volunteering program encouraging strengthening the framework for improving cybersecurity. Pusey and Sadera (2011) argued the federal government will be assisted in coordinating points for owner and operators of critical infrastructure interested in enhancing their cyber risk management processes, and suggested that more research is necessary in interconnecting of cybersecurity and physical security. Pastel, Robert, Seigel, Marika, Team Building in Multidiscipinary Client-Sponsored Project Courses, CM Transitions on Computing Education (TOCE), v. 15 n 4, December 2015.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 13 Summary This article explains how cyber infrastructure continues to grow rapidly in society today, with crimes taking multiple forms that have caused more emphasis to be placed on securing information as a priority. To fight cybercrimes; criminal evidence have to be gathered from computer-based systems, which is different from collecting evidence from conventional criminals. Patel and Seigel (2015) argument was that it caused confusion with investigators attempting to deal with cybercrimes. The need of securing computers and communication is more important than ever. Also, the need for entry-level developers with the capability of designing and building a practical solution with tough security requirements has increased. The authors held that careful attention is needed in aligning algorithm choices, method implementation, and trade-off with implementing software and hardware to combat cybercrimes. According to Patel and Seigel (2015), offices in Rochester Institute of Technology was motivated to create a multi-disciplinary course that integrated the algorithmic, engineering, and other security aspects to enhance cyber security. Critical Analysis The DHS offers a variety of free tools and resources to both government and private sectors enabling security of the critical infrastructure. A key part of the DHS mission consists of creating shared situational awareness of malicious cyber activities. The National Cybersecurity and Communications Integration Center (NCCIC) purpose is securing a communication infrastructure to support homeland security, the economy, and the health and safety of Americans. Their focus was to benefit businesses in coordinating proactively the prevention and
Cyber Security 14 mitigation of cyber threats that pose a risk to the nation. Pastel and Seigel (2015) suggested that additional research is required to perfect the multi-disciplinary courses. Value of Article This article is very valuable to both large and small businesses and the government because it focuses and mission is reducing the likelihood of severe incidents that could compromise the resilience and security of the critical information technology and communications networks of the nation. The NCCIC specific mission is to achieve its vision by executing its mission effectively. Their focus consists of three core strategic priorities and objectives. Their strategy will be implemented by explaining their capabilities, products, and services needed in meeting its strategic priorities during the next few years. Rees, L. P. Deane, J. K., Rakes, T. R. (June 01, 2011). Decision support for cybersecurity risk planning. Decision Support Systems, 51, 3, 493-606. Summary The purpose of this article was to explain the security measures assisting in ensuring availability, confidentiality, and integrity of information systems and preventing losses from attacks on cybersecurity (Rees, Deane, and Rakes, 2011). The authors’ argument was that because of uncertainty, the threats financial effect of attacking assets many times was difficult to quantitatively measure, and additional research was required. Also, it was difficult to determine what counter measure will apply. This article described a decision supporting system that could be used for calculating uncertain risks organizations may face under cyberattack. The system will use a genetic algorithm for searching for the best counter measures that will allow users to determine the best tradeoff between cost and risk. The data manufacturing firm data collected will provide examples of the results under realistic conditions (Rees, Deane, and Rakes, 2011).
Cyber Security 15 The transaction of commerce was a major concern for securing information technology (IT). The task magnitude increased tremendously, as attackers gain more knowledge, become more determined, and become bolder in their attack effort. Rees, Deane, and Rakes (2011) argued that emerging new attacks target new technology on a corporate level can impact the organizations security. The DHS and executives or most organizations view security as a top priority. Critical Analysis According to the authors, to aid planners and to reduce security risks the decision support system (DSS) was designed to prevent security threats at a reduced cost. The DSS will synthesize and allow management to characterize threats that produce a loss and will enable comparison economically with cost and counter measures. Their recommendation was that the components of the DSS database management should provide a special approach in collecting security inputs that grew from conversations with IT professionals. Value of Article The article was viewed as valuable because security threats to the government and businesses large and small is a major concern. The purpose of implementing the DSS was to support the reduction of security threats and risk. Also, maintaining a sustained readiness in responding immediately to any cyber security threats involving exchanging information. It was recommended that breaking down the institutional and technology barriers would impede information collaboration, and understanding the impact of security threats. The government, both large and small business, and individuals will gain value from the article. Perkel, J. (2010). Cybersecurity: How safe are your data? Nature , 464 (7293), 1260-1261. Summary
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 16 The purpose of the article was to offer an insight on sharing cyber threat indicators using an automated indicator sharing (AIS). This data sharing indicator enables exchanging of cyber threat indicators in the governmental departments, private sectors, and agencies at the speed of machines that allow its participants to mitigate near-real-time cyber threats (Perkel, 2010). The AIS is used for connecting participants to the DHS managed system allowing bi-directional sharing of cyber threat indicators. According to Perkel (2010), the DHS developed indicators cannot be shared by the AIS, but participants are allowed to share the threat indicators in their network. Perkel (2010) argued that the information could assist the DHS in building current cyber threats knowledge, and assist in protecting the public health and safety. The Department of Homeland Security took safety measures in ensuring appropriate privacy and civil liberties were fully implemented and tested regularly. To ensure the personally identifiable information was protected a process was designed by AIS that included ensuring the PII was protected by performing automated analysis and technical mitigations. Also ensuring information collected and used for network defense purposes except in circumstances dealing with law enforcement (Perkel, 2010). The initiative of AIS to critical infrastructure partners, private sectors, federal, state, and local governments. The DHS published a privacy impact assessment that detailed the risks identified with its capabilities and its mitigation implemented and addressed them (Perkel, 2010). Critical Analysis According to Perkel (2010), The Department of Homeland Security (DHS) goal is to protect privacy and information from cybercriminals and took appropriate measures to safeguard data and financial information. They incorporated elements of human review ensuring automated processes function properly, and minimized the amount of data cyber threats
Cyber Security 17 indicators maintained. He argued that they should retain information needed in addressing cyber threats and ensured the information collected was used only for the specified purposes. Value of Article This article was found to be valuable to both businesses and the government in securing data and information from cyber criminals. Also, the DHS were careful in implementing processes to protect t privacy and compliance protection. This article provides a method of rapid cyber data sharing that connects its participant organizations to the DHS and allowing bi- directional sharing of indicators of cyber threats that will enhance the Federal Government and the DHS ability to block cyberattacks before any intrusions can occur. Perkel (2010) suggested that the AIS share the DHS developed indicators and allow the participants to share threat indicators they observed from their efforts in network defense. Davis, G., Garcia, A., & Zhang, W. (September 01, 2009). Empirical Analysis of the Effects of Cyber Security Incidents. Risk Analysis, 29, 9, 1304-1316. Summary The purpose of this article involved analyzing time series associated with traffic on the web for online business that was critically affected by cyber security incidents. These incidents may cause some businesses to opt out of conducting business online (Davis and Zhang, 2009). Their argument was that these businesses may refrain from conducting business online or assessing online services. Davis and Zhang (2009) argued that companies that rely exclusively on online channels may make a risky business decision that could affect their profit. Critical Analysis
Cyber Security 18 According to Davis and Zhang (2009), the online business was tested for structure changes that could cause cyber security incidents. The results indicated that cyber security incidents did not affect the web traffic structure set for online businesses. The authors’ argument was based on considerations of public policy that stemmed from their analysis. Their analysis consisted of undertaking a structured test of time series associated with portal traffic online. Their results consistently indicated that web traffic was not affected by cyber security incidents. In comparing the test results, the authors argument was based the results that customers’ behavior was likely to change if they could not access websites more so than companies suffering data breach (Davis & Zhang, 2009). Value of Article This article should be read by people with online businesses that experienced cyber security risks. Davis and Zane (2009) indicated that most credit companies experience theft from customers and held liable for false charges. They argued that when customers are affected by a security breach is low; the premium security adjustments marginal deterioration are negligible customers switch is unlikely. Customers engaging in online transactions with low frequency will probably remain unaware of the cyber security incident that affects the online portals used regularly. The authors suggested that difficulty is experienced in trying to convince companies to invest in cyber security. Cybersecurity incidents financial losses are likely caused by the potential liabilities associated with cyber breaches (2009). Rudasill, L., & Moyer, J. (2004). Cyber-security, cyber-attack, and the development of governmental response: The librarian's view. New Library World, 105 (7), 248-255.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 19 Retrieved from http://search.proquest.com.ezproxy.uiu.edu/ docview/229656163? accountid=4870 Summary The purpose of this article was to provide an overview of security policies historical development information that involved multiple government and agencies. This history of government technology and security threats exists in both the military and the civilian population today. The documents provided by organizations regarding economic cooperation and development in the United States and the European Union are compared. The policy analysis determined similarities regarding how national political agencies react to cyber threats. Rudasil and Moyer (2004) argued that the cyberattack concepts go beyond the military targeting the infrastructure of the nation. Strategic civilian sites may experience cyberattacks from direct physical such as corrupting the water system or bombing nuclear plants. In the civilian spheres, cyberattacks revolved around Trojan horses, viruses, worms, or denial of services. These attacks can be dangerous and deadly, and include service disruption to networks to emergency responders or to medical facilities. Also, visible cyberattacks are experienced in libraries where services are involuntarily shut down. Rudasil and Moyer (2004) argued that the relationship between terrorism and cyberattacks should be studied on multiple levels. They recommended that in a global society, the relationship between the government and information technology and the impetus for expanding and controlling the Internet should come from the economic and political sectors (2004). Critical Analysis
Cyber Security 20 Rudasill and Moyer (2004) indicated that additional research is required on cyberattacks and terrorism. Shortly after the September 12, 2002, attacks on the United States, conflict between several nations was reviewed, and a conclusion was reached that the cyberattacks coincided with current conflict. They argued that information accessed and shared globally has encouraged multiple nations to review the extent of problems that could be caused from hostile users of the Internet. The purpose of the government information policy was to expand accessibility of information and resources to include a clear purpose for controlling abuse of the Internet and protect resources from cyberattacks. Recommendations were made regarding the United States and the European Union in taking appropriate steps in appointing a task force to increase cybersecurity. Value of Article The article should be read by businesses, the government, and individuals to understand how cybercriminals are focusing on the Internet to cause danger or harm to the people or businesses. Also, the importance of cyber security protection in the future of the cyber-world. As the networks systems inhabit the world, the security in a cyber-world is considered liquid and malleable as the network systems. Rudasil and Moyer (2004) suggested that people should remember that a lot of information is stored and shared on the Internet that can be easily retrieved. Cybersecurity is necessary to protect this information from cybercriminals. It is updated constantly based on cybercriminals advancements. The Internet contrasts with other systems and the greater the parts, the greater the tools required to protect people accessing the internet and protecting the network. Literature Review Essay
Cyber Security 21 Searching on the Internet at home, school, work, or with any moble device create an exposure to cyber criminals. Cyber opponents have presented threats to businessses, the United States government, private organizations, and individuals. As the internet activities grow and change, so does malicious criminal activity with the purpose of gaining a profit or to cause harm. Cyber attacks consist of more than game playing mischevious hackers, but from smart and well- organized criminals in nations looking to steal capital or intelligence, and considered the new face on cyberthreats. The emerge of cyber criminals and threats require the entire American community engaging to create a safey cyber environment (dhs.gov). This include, private sectors, government, law enforcement and the public. The DHS empowers its programs to be successful by incorporating security protection from the start. The DHS Privacy Office is the primary statutorily ordered security office in the federal government serving as a unique role, as an advisor, and division oversight. They view security as more than consistence with protection laws, it is about trust, certainty, and how the administration demonstrate capably straightforwardly in gathering, keeping, and utilizing identifable data (dhs.gov). The Department of Homeland Security and the cooperation of the National Cyber Security conduct an awareness month during October of each year to educate and engage businesses and the public on cybersecurity awareness (dhs.gov). The purpose of this event is to remind Americans of the importance of cybersecurity, and it is a shared responsibility to keep the internet safe for everyone. Milestone III:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 22
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 23
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 25
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 26
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 27
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 28
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 29 Reflection Most businesses and individuals in society today depend on computer systems, and when it comes to cybersecurity, no government, private sector, or individual can keep the country safe and strong alone. The mission of the Department of Homeland Security has become a priority for both state and local governments, individualism, and businesses. Information technology extensive nature in every aspect of society has prompted the Department of Homeland Security to expand and improve their coordination efforts in cybersecurity. Milestone I, informed this project by explaining the damage that cyber criminals can cause to businesses and individuals. These incidents can range from computer viruses, network outages, inconvenience or life-threatening. As mobile users increases so does the hackers and cybersecurity is important to protect networks, computers, and data from hackers, destruction, and unwanted or unauthorized changes. Cyberspace is difficult to secure because of the multiple factors including malicious actors ability to operate anywhere in the world. Over the years, the sophistication of cyberattacks has grown in volumes, and attention is required to protect data and to safeguard the security of the United States. In Milestone I, Henri Fayol and Abraham Maslow based their theories on administration and having programs in place to achieve goals. The Department of Homeland Security must have programs in place protect the security of the country and individuals from the destruction cyber criminals. Maslow’s goal was to provide a useful insight in understanding and managing security (gdufs.biz). Also, these theorists discussed the importance of managing and understanding security, and provided options that included layering physical, administrative, and technical control depending on the needs. Another option they suggested included organizing or designing a control group that consisted of detective, preventative, deterrent, and corrective in a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 30 hierarchy triangle to prevent negative things from happening. This option consists of being proactive by preparing in advance in preventing negative things from occurring. This option is viewed as a good option instead of having to pick up the pieces after a crisis or disaster. Using a proximity card as a preventive control could be considered necessary (Clayton, 2010). This Milestone relates to my interest in the Department of Homeland Security’s vision and mission of ensuring America is safe, secure, and volatile against terrorists and hazards. Also, included is the responsibility of people, organizations, and state, local, and federal government share the responsibility of assisting the Department of Homeland Security in executing their vision and mission. Milestone II, informed this project by providing valuable articles, information, and suggestions to the Department of Homeland Security on implementing programs to secure data and to protect the country from harm of lurking cyber criminals. One of the articles discussed that poor understanding of cyber threats or ignorance could be dangerous to businesses and individual users. Businesses and individual may be reluctant in realizing the benefit of technology because they fear the safety of their personal information getting in the hands of cyber criminals (Singer and Friedman, 2014). The purpose of the Department of Homeland Security is to gauge the scale and cost of the attacks from cybercrimes. These crimes are well-established, widely recognized, and convenient for criminals to sell data and personal information for a profit. Any attempts in gauging crimes of this nature may result in various numbers based on the scale, cost, and effect of the cyberattack. Today, the growing concern of cyber threats to critical infrastructure is a major concern, as technology becomes integrated with physical operations infrastructure (Singer and Friedman, 2014). Also, this author indicated that modifiability of government agencies and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 31 business must search for ways to combat cybercrimes, and those businesses, the government, and individuals will gain knowledge and understand how to combat cybercrimes. According to Pusey and Sadera (2011), the Department of Homeland Security will continue serving as a leader in assisting with the alignment of critical infrastructure with resources used with the framework for managing cyber risks. The DHS implemented the National Infrastructure Coordinating Center (NICC) to serve as a hub for sharing information for supporting the security and resilience of the vital assets. To enhance the effectiveness and the efficiency of the United States government, this center will share both cyber and physical security information. According to this article, the federal government will have assistance in coordinating points for critical infrastructure owner and operators interest in enhancing their cyber risk management processes, and indicated that additional research is needed in interconnecting cybersecurity and physical security. Patel and Seigel (2015) indicated that to fight cybercrimes, criminal evidence should be gathered from compute-based systems, but is different from collecting evidence from conventional criminals. More entry-level developers with the capacity of designing and building a practical solution with tough security requirements are needed. Also, careful attention is necessary in aligning algorithm choices, method implementations, and trade-offs with implementing software and hardware in combating cybercrimes. The DHS implemented the National Cybersecurity Communication Integration Center (NCCIC) to secure communication infrastructure in supporting the economy, and the health and safety of Americans. Rees, Deane, and Rakes (2011) article indicated that because of uncertainty, the threats financial effect of attacking assets was difficult to quantitatively measure, and additional research was required. Also, the decision supporting system used for calculating uncertain risks
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 32 organization could face cyberattack, and genetic algorithm for searching for the best counter measures would allow users to determine the best tradeoff between cost and risks. A major concern of securing information technology was the transaction of commerce. The task magnitude increased tremendously, as attackers gained additional knowledge, became bolder, and more determined in their attack efforts. According to Perkel (2010) article, the Department of Homeland Security took safety measures in ensuring appropriate privacy and civil liberties were fully implemented and tested regularly. To ensure the personally identifiable information was protected, the Automated Indicator Sharing (AIS) was designed and included ensuring the PII was protected by performing automated analysis and technical mitigations. Also, ensuring protection for information collected and used for network defense purposed except in circumstances that dealt with law enforcement. Davis, Garcia, and Zhang (2009) article discussed the time involvement associated with web traffic for online business that was critically affected by cyber security incidents, and caused some businesses to opt out of conducting business online. Companies relying exclusively on online channels could make risky business decisions that could decrease their profit. Testing the online business for structure change that could cause security incidents indicated that cybersecurity incident did not affect the traffic structure set for online businesses. Their results consistently indicated that web traffic was not affected. Based on the test results, customer’s behavior was likely to change if they could not access websites more so than companies suffering data breach. Rudasil and Moyer (2004) article informed this project by providing information regarding an overview of security policies historical development information involving multiple
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 33 government and agencies. The history of government technology and security threats existed in both the military and the civilian population. In the civilian spheres, the cyberattacks revolved around Trojan horses, viruses, worms, or denial of services. These attacks can be dangerous and deadly, and also include disruption of networks to emergency responders or medical facilities. The recommendation was that in a global society, the relationship between the government, information technology, and the impetus for expanding and controlling the Internet should come from the economic and political sectors. Also, they recommended that the United States and the European Union should take appropriate steps in appointing a task force to increase cybersecurity. Each of the articles researched added value to this project as cybersecurity continues as the forefront focus and the government passed cybersecurity-related bills to assist in keeping the country safe from cybercriminals and terrorists. These cybersecurity-related bills enable federal agencies to effectively develop and implement protective strategies against cyber intruders. The Department of Homeland Security continuously diagnose, mitigate programs, and will continue to strengthen methods the federal agencies use to implement cyber strategies in protecting the networks, systems, and data from cybercriminals to keep the United States safe, secure, and successful. Also, the Department of Homeland Security and the National Cyber Security conduct an awareness month during October of each year to educate and engage business and the public on cybersecurity awareness.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 34 References Bucci, Steven and Inserra, David. (n. d.). Top 10 issues the new dhs nominee must face. Retrieved from http://www.heritage.org/research/reports/2013/10/top-10-issues-the-new- secretary-of-homeland-security-nominee-must-face Clayton, Alex. (2010). Comments: Maslow’s hierarchy of security. Retrieved from http://www.infosecurity-magazine.com/opinionscomment-maslows-hierarchy-of-security/ Davis, G., Garcia, A., & Zhang, W. (September 01, 2009). Empirical Analysis of the Effects of Cyber Security Incidents. Risk Analysis, 29, 9, 1304-1316. Cyber Security Division. Retrieved from https://www.dhs.gov/science-and-technology/cyber-security-division Leadership issues with critical incidents syllabus. Retrieved from http://uiuonline.com Management development. Retrieved from http://www.gdufs.biz/theorists.pdf . Master of homeland security. Retrieved from http://www.masterofhomelandsecurity.org/what-is-the-purpose-and-function-of- homeland-security.html Pastel, Robert, Seigel, Marika, Team Building in Multidiscipinary Client-Sponsored Project Courses, CM Transitions on Computing Education (TOCE), v. 15 n 4, December 2015. Perkel, J. (2010). Cybersecurity: How safe are your data?. Nature , 464 (7293), 1260-1261. Principles and functions of management. Retrieved from http://www.managers-net.com/Biography/Fayol.html Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Preservice Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a Difference. Journal Of Digital Learning In Teacher Education (International Society For Technology In Education) , 28 (2), 83-88.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Cyber Security 35 Rees, L. P. Deane, J. K., Rakes, T. R. (June 01, 2011). Decision support for cybersecurity risk planning. Decision Support Systems, 51, 3, 493-606. Rudasill, L., & Moyer, J. (2004). Cyber-security, cyber-attack, and the development of governmental response: The librarian's view. New Library World, 105 (7), 248-255. Retrieved from http://search.proquest.com.ezproxy.uiu.edu/ docview/229656163? accountid=4870 Singer, P. W. & Friedman, Allan. Cybersecurity and Cyberwar. (April 01, 2014). Network Security, 2014, 4, 4.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help