Week 8 - Final Project
doc
keyboard_arrow_up
School
University Of Arizona *
*We aren’t endorsed by this school
Course
524
Subject
Information Systems
Date
Nov 24, 2024
Type
doc
Pages
35
Uploaded by ChancellorFlowerOctopus27
1
Running Head: CYBER SECURITY
Upper Iowa University
PA-25-3A-71 Leadership Issues/Critical Incidents
Week 8 – Final Project
Cybersecurity
Cyber Security
2
Abstract for Milestone I: Theoretical Foundations
Over the past few years, the sophistication of cyberattack has grown tremendously, and
constant attention is required to protect data and personal information, and also to safeguard
national security.
Cybersecurity is to detect and eliminate digital spying as the top threat to
national security.
Cyberspace is difficult to secure because of the number of factors
involved, and the ability to act and operate maliciously anywhere in the world. The purpose
of this research is to share the sophistication of cyber actors in exploiting vulnerabilities to
steal banking information, data, disrupt, destroy, or threaten essential services. Also, to
provide details on preventing, protecting, responding, recovering, and building security to
ensure resilience against cybercrimes.
Abstract for Milestone II:
Professional Considerations
In this section of the research, key professional authors and valuable articles on cybersecurity
describe how the world has become more interconnected today than ever, and how the
Department of Homeland Security (DHS) and other agencies are working together to impact and
defeat cyber criminals from theft, abuse, fraudulently obtaining personal information, and
threatening the security of the country.
Also, how the Department of Homeland Security have
developed and implemented special divisions that include the United States Secret Service, the
United States Immigration and customs Enforcement (ICE) and other programs focusing on
combating cybercrimes.
Cyber Security
3
Abstract for Milestone III: Application
Cybersecurity protection is important now and in the future of the cyber world, and as the
world is inhabited by the network systems, the security is considered liquid and malleable in
the cyber world.
It is important for the government, businesses and individuals to realize and
remember the amount of information stored and shared on the internet that cyber criminals
can easily retrieve.
Cyber security is important and necessary to protect this information
from cyber criminals based on their advancement.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
4
Table of Contents
Milestone I – Cyber Security Purpose ………………………………………………
5
Theorists to Research for this Assignment………………………………….5
Discuss a topic across the theorist…………………………………………..
6
How does this topic relate to my area of special interest? …………………
6-7
How does the topic relate to the course objectives? ……………………….
7
What questions would I like to have answered in this knowledge area?
…..
7
What patterns or common theme emerges from these theorists?
………….
7
What makes each writer different from the others in the field?
……………
8
Milestone II – Annotated Bibliography ……………………………………………..
9-20
Literature Review……………………………………………………………
21
Milestone III – Project ………………………………………………………………
22-28
Reflection …………………………………………………………………...
29-33
References……………………………………………………………………………
34-35
Cyber Security
5
Milestone 1 – Cyber Security
Purpose
Incidents including network outages, computer viruses, and network outages affect people
lives and businesses, ranging from inconvenience to life-threatening.
Opportunities and
exploitation for hackers increase as mobile users, digital application and data network increases.
Cyber security is known by many people as information technology security and focus on
protecting networks, computers, and data from hackers, destruction, or unintended changes.
Most businesses and the government use computers for collecting, processing, and storing a large
amount of data and information and transmitting to other networks or other computers.
The
cyberattack sophistication has grown in volumes, and ongoing attention is required to protect
information as well as safeguarding national security.
Cyberattacks and digital spying is the top
threats to national security, eclipsing terrorism (Bucci & Inserra, n. d.).
Theorists to Research for this Assignment
The theorists to research for this assignment include Henri Fayol, who theorizing regarded
administration and what worked well for the organization.
Fayol promoted a persistent set of
principles that organizations should apply to operate properly (managers-net.com).
It
is
important that the Department of Homeland Security (DHS) have a cyber security program in
place to protect business and individuals finances and data.
Abraham Maslow described five
goals that cannot be implemented until the previous goals are implemented.
Physiological such
as hunger, sleep, shelter, security, freedom from attack, were included in the goals.
Maslow’s
goal is to provide a useful insight into understanding and managing security (gdufs.biz).
Cyber Security
6
Discuss a topic across the theorist
Managing and understanding security could be as simple as layering physical,
administrative, and technical control types based on dependency.
A possible argument is that
physical security is a basic requirement for protecting information. The layers consist of
administrative policies and standards and procedures that oil the security management wheel.
The benefit of using this approach is to assist the technical security team in focusing on
considering the physical and administrative aspect of security before a technical solution is
deployed.
Another option is to design the control group consisting of detective, preventative,
deterrent, and corrective in a hierarchy triangle to prevent negative things from happening.
This
option is better than an option consisting of picking up the pieces after an event or disaster.
Therefore, using a proximity card as a preventive control could be considered a necessity
(Clayton, 2010).
How does this topic relate to my area of special interest?
The topic relates to my interest in the Department of Homeland Security’s vision of ensuring
America is safe, secure, and volatile against terrorist and hazards.
The DHS foundation is based
on these three concepts that form the national homeland security foundation strategy in designing
and achieving its mission.
Also, these three key concepts drive broad activity areas processed by
the Quadrennial Homeland Security Review (QHSR) that define the mission of homeland
security (Clayton, 2010).
The mission and their objectives provide details on the meaning of preventing, protecting,
responding, recovering, and building security, ensuring resilience, and facilitating customs and
exchange.
People across the state, local, and federal government, the private sector, and non-
governmental organizations share the responsibility of executing these missions.
These people
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
7
regularly interact with the public with the responsibility of providing safety and security of our
nation.
Also, they perform research and develop technology, prepare, and respond to threats and
disasters.
They have a clear sense of what is involved in achieving the overarching vision
(Clayton, 2010).
How does the topic relate to the course objectives?
The topic is relevant to the course objectives that include identifying and discussing concepts
and theoretical approaches to managing a disaster response.
It includes differentiating between
ordinary operational management and leadership during crisis situations, evaluating the roles and
responsibilities of governmental and non-governmental agencies in supporting the National
Response Framework, understanding the NIMS and ESFs functions.
Also, included is analyzing
emergency operations involving multi-jurisdictional response agencies (uiuonline.com).
What questions would I like to have answered in this knowledge area?
1.
Should the Department of Homeland use the layered approach to security the nation from
cyberattacks?
2.
Are there any loop holes in the layered approach that can make it difficult for hackers to
hack into computers?
3.
Will the prevention system automatic shut off computers left on?
What patterns or common theme emerges from these theorists?
Both theorists Abraham Maslow and Henri Fayol focus is issue problem-solving and success in
life.
Maslow’s focus is security hierarchy and that life is built on layers of according to the
dependent needs with the self-fulfillment needs as the top layer and the physiological needs as
the bottom layer.
Henri Fayol focus is management theory on interacting with personnel and that
management should interact with personnel in planning, organizing, commanding, coordinating,
and controlling.
Cyber Security
8
What makes each writer different from the others in the field?
Henry Fayol is the contributor of modern management concepts and his management concept
was significant to most researchers who followed his pattern.
Also, he contributed to
organizational management practices and theory and claimed that focusing on management
practices misunderstandings may be minimized, and the organization’s efficiency could increase.
Abraham Maslow intent was never to be in management but based his theory on security
hierarchy and the hierarchy of human needs.
I believe that more focus should be placed on
Maslow’s ideas because they could apply in the 21
st
century.
Safety and security consist of
knowing danger is not present, and knowing care and protection is there no matter what.
Cyber Security
9
Annotated Bibliography
Singer, P. W. & Friedman, Allan. Cybersecurity and Cyberwar. (April 01, 2014).
Network
Security, 2014,
4, 4.
The purpose of this article was to inform the reader of cybersecurity and how a poor
understanding of cyber threats or ignorance can cause unwanted consequences. Both businesses
and individuals may be reluctant in realizing the benefit of technology and fear their information
may get in the hands of criminals and sold.
They may engage behaviors that cause risk and
result in inconveniences to disasters, in the process of adding to the cyber anxiety culture felt
(Singer and Friedman, 2014).
Today, cybercrimes are well-established, and the convenience for criminals to make money
selling the stolen data.
The government agencies, security, and businesses are seeking to gauge
the scale and cost of cybercrimes attacks.
Some agencies try to gauge the cybercrime impact
globally, whereas others try to quantify the impact by focusing on a specific geo-political region
(Singer and Friedman, 2014). Cybercrime is a problem widely recognized, and any attempts to
gauge this type of crime results in various numbers based on the scale, cost, and effect of such
attacks.
Singer and Friedman (2014) indicate that the infrastructure of cyberspace is vulnerable to
a variety of risks from cyber threats to hazardous.
Cyberspace is difficult to secure because of
the factors involved and the malicious actors’ ability to operate from different parts of the world.
Also, according to the author, the growing concern of cyber threats to critical infrastructure has
become a major concern, as technology become integrated with physical operations
infrastructure, the risk increases on a wide scale with high-consequences that could cause harm
or disrupt services our lives depend on.
He argued that a variety of crimes are perpetrated
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
10
through cyberspace and have caused human and economic consequences, and sophisticated
cyber actors exploit vulnerabilities and capable of disrupting, destroying, or threaten essential
services.
Critical Analysis
Singer and Friedman (2014) stated that the world today is more interconnected than ever,
and with its advantages come increased risk, fraud, theft, and abuse.
The Department of
Homeland Security (DHS) and other agencies work together to impact and defeat cyber
criminals and to develop standardized methods of investigating cyber incidents.
The DHS have
special divisions such as the United States Secret Service, the United States Immigration, and
Customs Enforcement (ICE) focus is to combat cybercrimes.
Value of Article
This article should be read by both business and individuals to inform them on how the
DHS use hazardous approaches to safeguard cyberspace critical infrastructure.
The DHS
coordinates with other agencies and private sectors to share information on vulnerabilities and
cyber threats to fully understand the infrastructure system interdependency nationwide.
The
approach used by the DHS is to protect, prevent, mitigate, and recover from cyberattacks.
He
suggested results of this study indicated that modifiability of government agencies and
businesses has to seek ways to combat cybercrimes and ways to protect data and people private
information.
The government, both large and small business, and individuals will gain value
from the article.
Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Preservice
Cyber Security
11
Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a
Difference.
Journal Of Digital Learning In Teacher Education (International Society For
Technology In Education)
,
28
(2), 83-88.
Summary
The purpose of this article was to discuss cyber safety and framework for protecting
critical infrastructure as a major priority for our nation.
In 2013, President Obama signed an
Executive Order to improve cybersecurity critical infrastructure (Pusey and Sadera, 2011).
According to the author, a major component of the Executive Order was developing the National
Institute of Standards and Technology Cybersecurity Framework to assist critical infrastructure
sectors in reducing and managing cyber risks regardless of the sophistication or size of cyber
security.
The framework of cybersecurity can be used in aligning cybersecurity decision with
mission objectives, organizing security requirements that originate from legislation, policy,
regulation, and industry best practice.
The framework of cybersecurity was communicating its
requirements with stakeholders, partners, suppliers, and to integrate cybersecurity activities with
civil liberties risk management.
Pusey and Sadera (2011) argument was the cybersecurity
framework was considered a living document and will be constantly updated and improved with
feedback from industries.
As the cybersecurity framework is practiced, experiences and lessons
will be integrated into the future framework.
The authors indicated that the experiences would
ensure the critical infrastructure owners and operator needs were met and become a challenge to
environments of new risks, threats, and solutions (Pusey and Sadera, 2011).
Critical Analysis
Cyber Security
12
According to Pusey and Sadera (2011), The Department of Homeland Security will
continue serving as a leader in assisting with aligning critical infrastructure with resources to use
with the framework for managing cyber risks.
They argued that when an incident occurs
affecting the critical infrastructure and required coordination between owner and operators of the
critical infrastructure of the nation, the National Infrastructure Coordinating Center (NICC)
would serve as the hub for sharing information for supporting the security and resilience of the
vital assets.
The NICC would share both cyber security and physical security information for
enhancing efficiency and effectiveness of the United States government in securing critical
infrastructure.
Value of Article
This article should be read by both individuals and businesses as they gain knowledge of
cybersecurity.
The article discusses dealing with the interconnection of cybersecurity and
physical security, and how the DHS became partners with the critical infrastructure community
in establishing a volunteering program encouraging strengthening the framework for improving
cybersecurity.
Pusey and Sadera (2011) argued the federal government will be assisted in
coordinating points for owner and operators of critical infrastructure interested in enhancing their
cyber risk management processes, and suggested that more research is necessary in
interconnecting of cybersecurity and physical security.
Pastel, Robert, Seigel, Marika, Team Building in Multidiscipinary Client-Sponsored Project
Courses, CM Transitions on Computing Education (TOCE), v. 15 n 4, December 2015.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
13
Summary
This article explains how cyber infrastructure continues to grow rapidly in society today,
with crimes taking multiple forms that have caused more emphasis to be placed on securing
information as a priority.
To fight cybercrimes; criminal evidence have to be gathered from
computer-based systems, which is different from collecting evidence from conventional
criminals.
Patel and Seigel (2015) argument was that it caused confusion with investigators
attempting to deal with cybercrimes.
The need of securing computers and communication is more important than ever.
Also,
the need for entry-level developers with the capability of designing and building a practical
solution with tough security requirements has increased.
The authors held that careful attention
is needed in aligning algorithm choices, method implementation, and trade-off with
implementing software and hardware to combat cybercrimes.
According to Patel and Seigel
(2015), offices in Rochester Institute of Technology was motivated to create a multi-disciplinary
course that integrated the algorithmic, engineering, and other security aspects
to enhance cyber
security.
Critical Analysis
The DHS offers a variety of free tools and resources to both government and private
sectors enabling security of the critical infrastructure. A key part of the DHS mission consists of
creating shared situational awareness of malicious cyber activities.
The National Cybersecurity
and Communications Integration Center (NCCIC) purpose is securing a communication
infrastructure to support homeland security, the economy, and the health and safety of
Americans.
Their focus was to benefit businesses in coordinating proactively the prevention and
Cyber Security
14
mitigation of cyber threats that pose a risk to the nation.
Pastel and Seigel (2015) suggested that
additional research is required to perfect the multi-disciplinary courses.
Value of Article
This article is very valuable to both large and small businesses and the government
because it focuses and mission is reducing the likelihood of severe incidents that could
compromise the resilience and security of the critical information technology and
communications networks of the nation.
The NCCIC specific mission is to achieve its vision by
executing its mission effectively.
Their focus consists of three core strategic priorities and
objectives.
Their strategy will be implemented by explaining their capabilities, products, and
services needed in meeting its strategic priorities during the next few years.
Rees, L. P. Deane, J. K., Rakes, T. R. (June 01, 2011). Decision support for cybersecurity risk
planning.
Decision Support Systems, 51,
3, 493-606.
Summary
The purpose of this article was to explain the security measures assisting in ensuring
availability, confidentiality, and integrity of information systems and preventing losses from
attacks on cybersecurity (Rees, Deane, and Rakes, 2011).
The authors’ argument was that
because of uncertainty, the threats financial effect of attacking assets many times was difficult to
quantitatively measure, and additional research was required.
Also, it was difficult to determine
what counter measure will apply.
This article described a decision supporting system that could
be used for calculating uncertain risks organizations may face under cyberattack. The system will
use a genetic algorithm for searching for the best counter measures that will allow users to
determine the best tradeoff between cost and risk.
The data manufacturing firm data collected
will provide examples of the results under realistic conditions (Rees, Deane, and Rakes, 2011).
Cyber Security
15
The transaction of commerce was a major concern for securing information technology
(IT).
The task magnitude increased tremendously, as attackers gain more knowledge, become
more determined, and become bolder in their attack effort.
Rees, Deane, and Rakes (2011)
argued that emerging new attacks target new technology on a corporate level can impact the
organizations security.
The DHS and executives or most organizations view security as a top
priority.
Critical Analysis
According to the authors, to aid planners and to reduce security risks the decision support
system (DSS) was designed to prevent security threats at a reduced cost.
The DSS will
synthesize and allow management to characterize threats that produce a loss and will enable
comparison economically with cost and counter measures.
Their recommendation was that the
components of the DSS database management should provide a special approach in collecting
security inputs that grew from conversations with IT professionals.
Value of Article
The article was viewed as valuable because security threats to the government and
businesses large and small is a major concern.
The purpose of implementing the DSS was to
support the reduction of security threats and risk.
Also, maintaining a sustained readiness in
responding immediately to any cyber security threats involving exchanging information.
It was
recommended that breaking down the institutional and technology barriers would impede
information collaboration, and understanding the impact of security threats. The government,
both large and small business, and individuals will gain value from the article.
Perkel, J. (2010). Cybersecurity: How safe are your data?
Nature
,
464
(7293), 1260-1261.
Summary
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
16
The purpose of the article was to offer an insight on sharing cyber threat indicators using
an automated indicator sharing (AIS).
This data sharing indicator enables exchanging of cyber
threat indicators in the governmental departments, private sectors, and agencies at the speed of
machines that allow its participants to mitigate near-real-time cyber threats (Perkel, 2010).
The
AIS is used for connecting participants to the DHS managed system allowing bi-directional
sharing of cyber threat indicators.
According to Perkel (2010), the DHS developed indicators
cannot be shared by the AIS, but participants are allowed to share the threat indicators in their
network.
Perkel (2010) argued that the information could assist the DHS in building current
cyber threats knowledge, and assist in protecting the public health and safety.
The Department of Homeland Security took safety measures in ensuring appropriate
privacy and civil liberties were fully implemented and tested regularly.
To ensure the personally
identifiable information was protected a process was designed by AIS that included ensuring the
PII was protected by performing automated analysis and technical mitigations.
Also ensuring
information collected and used for network defense purposes except in circumstances dealing
with law enforcement (Perkel, 2010).
The initiative of AIS to critical infrastructure partners, private sectors, federal, state, and
local governments.
The DHS published a privacy impact assessment that detailed the risks
identified with its capabilities and its mitigation implemented and addressed them (Perkel, 2010).
Critical Analysis
According to Perkel (2010), The Department of Homeland Security (DHS) goal is to
protect privacy and information from cybercriminals and took appropriate measures to safeguard
data and financial information.
They incorporated elements of human review ensuring
automated processes function properly, and minimized the amount of data cyber threats
Cyber Security
17
indicators maintained.
He argued that they should retain information needed in addressing cyber
threats and ensured the information collected was used only for the specified purposes.
Value of Article
This article was found to be valuable to both businesses and the government in securing
data and information from cyber criminals. Also, the DHS were careful in implementing
processes to protect t privacy and compliance protection.
This article provides a method of rapid
cyber data sharing that connects its participant organizations to the DHS and allowing bi-
directional sharing of indicators of cyber threats that will enhance the Federal Government and
the DHS ability to block cyberattacks before any intrusions can occur.
Perkel (2010) suggested
that the AIS share the DHS developed indicators and allow the participants to share threat
indicators they observed from their efforts in network defense.
Davis, G., Garcia, A., & Zhang, W. (September 01, 2009). Empirical Analysis of the Effects of
Cyber Security Incidents.
Risk Analysis, 29,
9, 1304-1316.
Summary
The purpose of this article involved analyzing time series associated with traffic on the
web for online business that was critically affected by cyber security incidents.
These incidents
may cause some businesses to opt out of conducting business online (Davis and Zhang, 2009).
Their argument was that these businesses may refrain from conducting business online or
assessing online services.
Davis and Zhang (2009) argued that companies that rely exclusively
on online channels may make a risky business decision that could affect their profit.
Critical Analysis
Cyber Security
18
According to Davis and Zhang (2009), the online business was tested for structure
changes that could cause cyber security incidents.
The results indicated that cyber security
incidents did not affect the web traffic structure set for online businesses. The authors’ argument
was based on considerations of public policy that stemmed from their analysis.
Their analysis
consisted of undertaking a structured test of time series associated with portal traffic online.
Their results consistently indicated that web traffic was not affected by cyber security incidents.
In comparing the test results, the authors argument was based the results that customers’ behavior
was likely to change if they could not access websites more so than companies suffering data
breach (Davis & Zhang, 2009).
Value of Article
This article should be read by people with online businesses that experienced cyber
security risks.
Davis and Zane (2009) indicated that most credit companies experience theft
from customers and held liable for false charges.
They argued that when customers are affected
by a security breach is low; the premium security adjustments marginal deterioration are
negligible customers switch is unlikely.
Customers engaging in online transactions with low
frequency will probably remain unaware of the cyber security incident that affects the online
portals used regularly.
The authors suggested that difficulty is experienced in trying to convince
companies to invest in cyber security.
Cybersecurity incidents financial losses are likely caused
by the potential liabilities associated with cyber breaches (2009).
Rudasill, L., & Moyer, J. (2004). Cyber-security, cyber-attack, and the development of
governmental response: The librarian's view.
New Library World, 105
(7), 248-255.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
19
Retrieved from
http://search.proquest.com.ezproxy.uiu.edu/ docview/229656163?
accountid=4870
Summary
The purpose of this article was to provide an overview of security policies historical
development information that involved multiple government and agencies.
This history of
government technology and security threats exists in both the military and the civilian population
today.
The documents provided by organizations regarding economic cooperation and
development in the United States and the European Union are compared.
The policy analysis
determined similarities regarding how national political agencies react to cyber threats.
Rudasil
and Moyer (2004) argued that the cyberattack concepts go beyond the military targeting the
infrastructure of the nation.
Strategic civilian sites may experience cyberattacks from direct
physical such as corrupting the water system or bombing nuclear plants.
In the civilian spheres, cyberattacks revolved around Trojan horses, viruses, worms, or
denial of services.
These attacks can be dangerous and deadly, and include service disruption to
networks to emergency responders or to medical facilities.
Also, visible cyberattacks are
experienced in libraries where services are involuntarily shut down.
Rudasil and Moyer (2004)
argued that the relationship between terrorism and cyberattacks should be studied on multiple
levels.
They recommended that in a global society, the relationship between the government and
information technology and the impetus for expanding and controlling the Internet should come
from the economic and political sectors (2004).
Critical Analysis
Cyber Security
20
Rudasill and Moyer (2004) indicated that additional research is required on cyberattacks
and terrorism.
Shortly after the September 12, 2002, attacks on the United States, conflict
between several nations was reviewed, and a conclusion was reached that the cyberattacks
coincided with current conflict.
They argued that information accessed and shared globally has
encouraged multiple nations to review the extent of problems that could be caused from hostile
users of the Internet.
The purpose of the government information policy was to expand
accessibility of information and resources to include a clear purpose for controlling abuse of the
Internet and protect resources from cyberattacks.
Recommendations were made regarding the
United States and the European Union in taking appropriate steps in appointing a task force to
increase cybersecurity.
Value of Article
The article should be read by businesses, the government, and individuals to understand
how cybercriminals are focusing on the Internet to cause danger or harm to the people or
businesses.
Also, the importance of cyber security protection in the future of the cyber-world.
As the networks systems inhabit the world, the security in a cyber-world is considered liquid and
malleable as the network systems.
Rudasil and Moyer (2004) suggested that people should
remember that a lot of information is stored and shared on the Internet that can be easily
retrieved.
Cybersecurity is necessary to protect this information from cybercriminals.
It is
updated constantly based on cybercriminals advancements.
The Internet contrasts with other
systems and the greater the parts, the greater the tools required to protect people accessing the
internet and protecting the network.
Literature Review Essay
Cyber Security
21
Searching on the Internet at home, school, work, or with any moble device create an
exposure to cyber criminals. Cyber opponents have presented threats to businessses, the United
States government, private organizations, and individuals.
As the internet activities grow and
change, so does malicious criminal activity with the purpose of gaining a profit or to cause harm.
Cyber attacks consist of more than game playing mischevious hackers, but from smart and well-
organized criminals in nations looking to steal capital or intelligence, and considered the new
face on cyberthreats.
The emerge of cyber criminals and threats require the entire American
community engaging to create a safey cyber environment (dhs.gov).
This include, private
sectors, government, law enforcement and the public.
The DHS empowers its programs to be successful by incorporating security protection from
the start.
The DHS Privacy Office is the primary statutorily ordered security office in the federal
government serving as a unique role, as an advisor, and division oversight.
They view security
as more than consistence with protection laws, it is about trust, certainty, and how the
administration demonstrate capably straightforwardly in gathering, keeping, and utilizing
identifable data (dhs.gov).
The Department of Homeland Security and the cooperation of the National Cyber Security
conduct an awareness month during October of each year to educate and engage businesses and
the public on cybersecurity awareness (dhs.gov). The purpose of this event is to remind
Americans of the importance of cybersecurity, and it is a shared responsibility to keep the
internet safe for everyone.
Milestone III:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
22
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
23
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
24
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
25
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
26
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
27
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
28
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
29
Reflection
Most businesses and individuals in society today depend on computer systems, and when
it comes to cybersecurity, no government, private sector, or individual can keep the country safe
and strong alone.
The mission of the Department of Homeland Security has become a priority
for both state and local governments, individualism, and businesses.
Information technology
extensive nature in every aspect of society has prompted the Department of Homeland Security
to expand and improve their coordination efforts in cybersecurity.
Milestone I, informed this project by explaining the damage that cyber criminals can
cause to businesses and individuals.
These incidents can range from computer viruses, network
outages, inconvenience or life-threatening.
As mobile users increases so does the hackers and
cybersecurity is important to protect networks, computers, and data from hackers, destruction,
and unwanted or unauthorized changes.
Cyberspace is difficult to secure because of the multiple
factors including malicious actors ability to operate anywhere in the world.
Over the years, the
sophistication of cyberattacks has grown in volumes, and attention is required to protect data and
to safeguard the security of the United States.
In Milestone I, Henri Fayol and Abraham Maslow based their theories on administration
and having programs in place to achieve goals.
The Department of Homeland Security must
have programs in place protect the security of the country and individuals from the destruction
cyber criminals. Maslow’s goal was to provide a useful insight in understanding and managing
security (gdufs.biz).
Also, these theorists discussed the importance of managing and
understanding security, and provided options that included layering physical, administrative, and
technical control depending on the needs.
Another option they suggested included organizing or
designing a control group that consisted of detective, preventative, deterrent, and corrective in a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
30
hierarchy triangle to prevent negative things from happening.
This option consists of being
proactive by preparing in advance in preventing negative things from occurring. This option is
viewed as a good option instead of having to pick up the pieces after a crisis or disaster.
Using a
proximity card as a preventive control could be considered necessary (Clayton, 2010).
This
Milestone relates to my interest in the Department of Homeland Security’s vision and mission of
ensuring America is safe, secure, and volatile against terrorists and hazards.
Also, included is the
responsibility of people, organizations, and state, local, and federal government share the
responsibility of assisting the Department of Homeland Security in executing their vision and
mission.
Milestone II, informed this project by providing valuable articles, information, and
suggestions to the Department of Homeland Security on implementing programs to secure data
and to protect the country from harm of lurking cyber criminals. One of the articles discussed
that poor understanding of cyber threats or ignorance could be dangerous to businesses and
individual users.
Businesses and individual may be reluctant in realizing the benefit of
technology because they fear the safety of their personal information getting in the hands of
cyber criminals (Singer and Friedman, 2014).
The purpose of the Department of Homeland Security is to gauge the scale and cost of the
attacks from cybercrimes.
These crimes are well-established, widely recognized, and convenient
for criminals to sell data and personal information for a profit.
Any attempts in gauging crimes
of this nature may result in various numbers based on the scale, cost, and effect of the
cyberattack.
Today, the growing concern of cyber threats to critical infrastructure is a major
concern, as technology becomes integrated with physical operations infrastructure (Singer and
Friedman, 2014).
Also, this author indicated that modifiability of government agencies and
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
31
business must search for ways to combat cybercrimes, and those businesses, the government, and
individuals will gain knowledge and understand how to combat cybercrimes.
According to Pusey and Sadera (2011), the Department of Homeland Security will
continue serving as a leader in assisting with the alignment of critical infrastructure with
resources used with the framework for managing cyber risks.
The DHS implemented the
National Infrastructure Coordinating Center (NICC) to serve as a hub for sharing information for
supporting the security and resilience of the vital assets.
To enhance the effectiveness and the
efficiency of the United States government, this center will share both cyber and physical
security information.
According to this article, the federal government will have assistance in
coordinating points for critical infrastructure owner and operators interest in enhancing their
cyber risk management processes, and indicated that additional research is needed in
interconnecting cybersecurity and physical security.
Patel and Seigel (2015) indicated that to fight cybercrimes, criminal evidence should be
gathered from compute-based systems, but is different from collecting evidence from
conventional criminals.
More entry-level developers with the capacity of designing and building
a practical solution with tough security requirements are needed.
Also, careful attention is
necessary in aligning algorithm choices, method implementations, and trade-offs with
implementing software and hardware in combating cybercrimes.
The DHS implemented the
National Cybersecurity Communication Integration Center (NCCIC) to secure communication
infrastructure in supporting the economy, and the health and safety of Americans.
Rees, Deane, and Rakes (2011) article indicated that because of uncertainty, the threats
financial effect of attacking assets was difficult to quantitatively measure, and additional research
was required.
Also, the decision supporting system used for calculating uncertain risks
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
32
organization could face cyberattack, and genetic algorithm for searching for the best counter
measures would allow users to determine the best tradeoff between cost and risks.
A major
concern of securing information technology was the transaction of commerce.
The task
magnitude increased tremendously, as attackers gained additional knowledge, became bolder,
and more determined in their attack efforts.
According to Perkel (2010) article, the Department of Homeland Security took safety
measures in ensuring appropriate privacy and civil liberties were fully implemented and tested
regularly.
To ensure the personally identifiable information was protected, the Automated
Indicator Sharing (AIS) was designed and included ensuring the PII was protected by performing
automated analysis and technical mitigations.
Also, ensuring protection for information
collected and used for network defense purposed except in circumstances that dealt with law
enforcement.
Davis, Garcia, and Zhang (2009) article discussed the time involvement associated with
web traffic for online business that was critically affected by cyber security incidents, and caused
some businesses to opt out of conducting business online. Companies relying exclusively on
online channels could make risky business decisions that could decrease their profit.
Testing the
online business for structure change that could cause security incidents indicated that
cybersecurity incident did not affect the traffic structure set for online businesses.
Their results
consistently indicated that web traffic was not affected. Based on the test results, customer’s
behavior was likely to change if they could not access websites more so than companies
suffering data breach.
Rudasil and Moyer (2004) article informed this project by providing information
regarding an overview of security policies historical development information involving multiple
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
33
government and agencies.
The history of government technology and security threats existed in
both the military and the civilian population. In the civilian spheres, the cyberattacks revolved
around Trojan horses, viruses, worms, or denial of services.
These attacks can be dangerous and
deadly, and also include disruption of networks to emergency responders or medical facilities.
The recommendation was that in a global society, the relationship between the government,
information technology, and the impetus for expanding and controlling the Internet should come
from the economic and political sectors.
Also, they recommended that the United States and the
European Union should take appropriate steps in appointing a task force to increase
cybersecurity.
Each of the articles researched added value to this project as cybersecurity continues as
the forefront focus and the government passed cybersecurity-related bills to assist in keeping the
country safe from cybercriminals and terrorists.
These cybersecurity-related bills enable federal
agencies to effectively develop and implement protective strategies against cyber intruders.
The
Department of Homeland Security continuously diagnose, mitigate programs, and will continue
to strengthen methods the federal agencies use to implement cyber strategies in protecting the
networks, systems,
and data from cybercriminals to keep the United States safe, secure, and
successful.
Also, the Department of Homeland Security and the National Cyber Security
conduct an awareness month during October of each year to educate and engage business and the
public on cybersecurity awareness.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
34
References
Bucci, Steven and Inserra, David. (n. d.).
Top 10 issues the new dhs nominee must face.
Retrieved from
http://www.heritage.org/research/reports/2013/10/top-10-issues-the-new-
secretary-of-homeland-security-nominee-must-face
Clayton, Alex. (2010).
Comments: Maslow’s hierarchy of security.
Retrieved from
http://www.infosecurity-magazine.com/opinionscomment-maslows-hierarchy-of-security/
Davis, G., Garcia, A., & Zhang, W. (September 01, 2009). Empirical Analysis of the Effects of
Cyber Security Incidents.
Risk Analysis, 29,
9, 1304-1316.
Cyber Security Division.
Retrieved from
https://www.dhs.gov/science-and-technology/cyber-security-division
Leadership issues with critical incidents syllabus.
Retrieved from
http://uiuonline.com
Management development.
Retrieved from
http://www.gdufs.biz/theorists.pdf
.
Master of homeland security.
Retrieved from
http://www.masterofhomelandsecurity.org/what-is-the-purpose-and-function-of-
homeland-security.html
Pastel, Robert, Seigel, Marika, Team Building in Multidiscipinary Client-Sponsored Project
Courses, CM Transitions on Computing Education (TOCE), v. 15 n 4, December 2015.
Perkel, J. (2010). Cybersecurity: How safe are your data?.
Nature
,
464
(7293), 1260-1261.
Principles and functions of management.
Retrieved from
http://www.managers-net.com/Biography/Fayol.html
Pusey, P. & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity. Preservice
Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a
Difference.
Journal Of Digital Learning In Teacher Education (International Society For
Technology In Education)
,
28
(2), 83-88.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cyber Security
35
Rees, L. P. Deane, J. K., Rakes, T. R. (June 01, 2011). Decision support for cybersecurity risk
planning.
Decision Support Systems, 51,
3, 493-606.
Rudasill, L., & Moyer, J. (2004). Cyber-security, cyber-attack, and the development of
governmental response: The librarian's view.
New Library World, 105
(7), 248-255.
Retrieved from
http://search.proquest.com.ezproxy.uiu.edu/ docview/229656163?
accountid=4870
Singer, P. W. & Friedman, Allan. Cybersecurity and Cyberwar. (April 01, 2014).
Network
Security, 2014,
4, 4.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help