notes research

docx

School

Liberty University *

*We aren’t endorsed by this school

Course

540

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by steezlebot

Report
In order to arrive at a sound position, you should offer your findings postured in salt and light. Specifically, it is important that you make the distinction of where and on what grounds the Cyber Crime Law and Public Policy literature comes up short as it relates to what the research in this particular area has for society versus what God in His Word has for society. You also must demonstrate how you might integrate your biblical worldview into the specific hypothesis. Critically expose the gaps or omissions in the literature regarding a biblical worldview Constructively integrate the biblical worldview into the hypothesis offered Bibliography (or Reference page) of the sources cited in the essay The exact requirements of the assignment are outlined as follows: Length of assignment: 6 pages; double-spaced; Arial or Times New Roman font; 12 pt. o Title page, abstract, reference section, etc. are excluded from this page count Format of assignment: APA Number of citations: 4 Acceptable sources (e.g., peer reviewed or scholarly journal articles published within the last five years) Proposed Topic: Cybersecurity protection and defense should (or should not) be federalized and monitored by the Department of Homeland Security in order to protect vital privately held national infrastructures such as airlines, electric power hubs, etc. Proposed Thesis Statement: With the world at an individual’s mere fingertips, and the age of technology, the digital world has made cybersecurity a high necessity. Hacking, online extortion, data breaches, and more are threatening some of the most vital infrastructures with a simple keystroke. The Department of Homeland Security is needed more than ever to protect these critical infrastructures (airlines, electric power hubs, etc.). Thesis statement should read like a hypothesis. Be strong. Declare a position and then argue it. Nonetheless, this will work. Please move forward. Dr. Orr What are the 3 parts of an argument thesis statement? Thesis statements have three parts: the topic, the claim, and the major points . The claim is your argument, opinion, or stance that will be supported by your evidence and examples. You present the evidence in the list of major points.
Rough start ex Not a lot of people think about the Christian worldview when they choose a career path; however, for me, this is a good way to look at life in general. We must understand that, by nature, humans are sinful and we must understand the need to serve God with everything we choose to do. This is also true when it comes to cybersecurity. In law enforcement, we know there are bad people in the world trying to do bad things every single day. As professionals, we need to understand that our ethics and values need to follow us throughout life, and by having a Christian worldview, we can better achieve this. Cybersecurity professionals can have years upon years of experience in that specific field along with hours upon hours of training. However, we need to continuously read the Bible in order to stray away from Christianity or we could fall down the rabbit hole of doing wrong. In law enforcement, we need to make sure our ethics are being up to par with our Christianity beliefs. Furthermore, we must not only do this because it morally and legally the right thing to do, but because we want to please God and live by His word. I Kings (6:16) tells us “Fear not: for they that be with us are more than they that be with them. “Praying allows us to feels God’s presence assuring us that his spiritual nature and oneness will keep us safeguarded and preserved. Growing up, we have been raised by our families to believe in his word in order to live the purest life possible. When a professional in law enforcement has a year of training, it cannot replace what we learned in church or by reading the Bible. Morals come into play in everything we do and when someone does not have a pure Christian outlook on life, they may make an immoral decision or a completely wrong one because they were not lead properly. By having a Christian worldview, this can all change for the better. Striving to be the best human being Biblical Worldview3 possible, while listening to His word, will always make us a better person that may also lead others to do the same. Without this mindset, we may fall short of what Christ has in store for us. Moving on, law enforcement training does not give us any compassion for people who are arrested or in prison. We are training to investigate and arrest those who have broken the law without a single thought about it. Afterward, we move on with life and go to the next call. Fortunately for us, we have a different mindset that allows us to use our compassion and empathy to treat others better. We all understand that bad people deserve their time in court and possible jail or prison time. However, we must also understand that while they must be punished for their crimes, we must focus that punishment as a way to rehabilitate them back into society.
Not4es Me: Humphreys, B. E. (2019 ). Critical infrastructure: emerging trends and policy considerations for congress.   R45809. Congressional Research Service, Washington, DC . Humphreys, B. E. (2019) It became apparent that the nation’s critical infrastructures were in dire need of protection as early as the late 1990s; however, it was not until the terrorist attacks on September 11, 2001 that need for protection against threats felt critical (Humphreys, 2019). This is when the U.S. Congress woke up and established the DHS as a way of identifying, prioritizing, and protecting critical systems and assets that contributed to national security, the economy, and public health. With the passing of the Cybersecurity and Infrastructure Security Agency (CISA) Act of 2018, resilience has been elevated to the top of the political agenda (Humphreys, 2019). Furthermore, Congress might modify existing asset identification and reporting requirements, narrow the scope of federal CI policy, assess the advantages and disadvantages of new risk management methods, transfer infrastructure security functions to or from DHS, enforce compliance with security standards, and evaluate the effectiveness of existing public-private partnerships (Humphreys, 2019). Rehak, D., Senovsky, P., Hromada, M., & Lovecek, T. (2019) The reliability of critical infrastructure services and commodities depends on the resilience of its elements. Resilience is a quality that has the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ability to reduce the vulnerability of a particular element. It can effectively absorb the effects of disruptive events and enhance the "element's ability to respond and recover." Additionally, it can facilitate adaptation in the event of disruptions similar to those encountered in the past. Resilience assessment plays a critical role in securing the security and dependability of these elements and the system in its entirety. The Critical Infrastructure Elements Resilience Assessment (CIERA) methodology definitively assesses the resilience of critical infrastructure elements through advanced statistical analysis. It assesses their strength, ability to recover functionality after a disruptive incident, and adaptability to past occurrences. This particular method is designed to identify any potential weak points within a critical infrastructure system and provide recommendations for improving the system's resilience. It thoroughly assesses each individual element within the system to ensure that any vulnerabilities are identified and addressed. While it is a comprehensive evaluation, it cannot directly compare different elements within the operator's infrastructure. Nonetheless, the method is an essential tool for ensuring the robustness and reliability of critical infrastructure systems. The control room case study of a power distribution company strongly indicates significant weaknesses in organizational resilience, risk management policies, and disruptive event scenario specifications. (Department of Homeland Security, 2023) https://www.dhs.gov/topics/cybersecurity The   Cyber Safety Review Board (CSRB) , an independent public-private advisory body administered by DHS through CISA, brings together public and private sector cyber experts/leaders to review and draw lessons learned from the most significant cyber incidents. Under the leadership of the Board’s Chair, DHS Under Secretary for Policy Robert Silvers, and Deputy Chair, Google VP for Security Engineering Heather Adkins, the CSRB recently published its first report on the Log4j software vulnerability. The report included 19 actionable recommendations for the public and private sectors to work together to build a more secure software ecosystem. DHS is already leading by example to implement the recommendations, through CISA guidance and Office of the Chief Information Officer initiatives to enhance open source software security and invest in open source software maintenance. The   Transportation Security Agency (TSA)   is charged with securing the nation’s transportation systems, which includes aviation, intermodal and surface transportation. The network of surface transportation operators include highway and motor carriers, freight and passenger railroad carriers, pipeline owners and operators, and mass transit carriers. In close coordination with CISA, TSA uses a combination of regulation and public-private partnerships to strengthen cyber resilience across the broad transportation network. TSA’s efforts include a combination of cybersecurity assessments and engagements; stakeholder education;
publication of cybersecurity guidance and best practices; and use of its regulatory authority to mandate appropriate and durable cybersecurity measures. The   United States Coast Guard (USCG)   enables operations at sea, in the air, on land and space by delivering effects and capabilities in and through cyberspace. It is the nation’s lead federal agency for securing and safeguarding the maritime domain. In its role as a military, law enforcement, and regulatory agency, the Coast Guard has broad authority to combat cyber threats and protect U.S. maritime interests both domestically and abroad. In support of the Maritime Transportation System (MTS), the Coast Guard continually promotes best practices, identifies potential cyber-related vulnerabilities, implements risk management strategies, and has in place key mechanisms for coordinating cyber incident responses. The   United States Secret Service (USSS)   investigates a range of cyber-enabled crime with a particular focus on protecting the nation’s financial infrastructure.   The Secret Service cybercrime mission focuses on acts that target and threaten the American financial system, such as network intrusions and ransomware, access device fraud, ATM and point-of-sale system attacks, illicit financing operations and money laundering, identity theft, social engineering scams, and business email compromises. Through the agency’s Cyber Fraud Task Forces (CFTF), the Secret Service brings together critical partners, to include other law enforcement agencies, prosecutors, private industry, and academia, to pursue a comprehensive response to the threat. Immigration and Customs Enforcement - Homeland Security Investigations (ICE HSI)   is a worldwide law enforcement leader in dark net and other cyber-related criminal investigations. HSI's Cyber Crimes Center (C3) delivers computer-based technical services to support domestic and international investigations into cross-border crime. C3's Child Exploitation Investigations Unit (CEIU) is a powerful tool in the fight against the sexual exploitation of children; the production, advertisement and distribution of child pornography; and child sex tourism. The   Office of the Chief Information Officer (OCIO)   ensures strong cybersecurity practices within DHS, so that the Department may lead by example. OCIO works with component agencies to mature the cybersecurity posture of the Department as a whole. OCIO continues to secure and strengthen the Department of Homeland Security’s cybersecurity posture by implementing and managing the DHS Information Security Program and ensuring DHS' compliance with applicable federal laws, executive orders, directives, policies, and regulations. The   Office of Policy   is leading the whole of federal government effort to coordinate, de-conflict, and harmonize cyber incident reporting requirements through the Cyber Incident Reporting Council. Established under the bipartisan Cyber Incident Reporting for Critical Infrastructure Act, the Council brings together federal departments and independent regulators. Through the Council, the Office of Policy is extensively engaging with private sector stakeholders to ensure that we hear from the stakeholders themselves who will benefit from streamlined reporting requirements to ensure greater quality, quantity, and timeliness.
FY22 Cybersecurity Sprints In his March 31, 2021, address, Secretary Mayorkas outlined a bold vision for the Department’s cybersecurity efforts to confront the growing threat of cyber-attacks, including a series of 60-day sprints to operationalize his vision, to drive action in the coming year, and to raise public awareness about key cybersecurity priorities. Learn more about the FY22 Cybersecurity Sprints Overview of Additional Ongoing Cybersecurity Priorities In addition to the series of 60-day sprints, the Secretary will focus on four ongoing priorities: (1) cementing the resilience of democratic institutions, including the integrity of elections and institutions outside of the executive branch, (2) building back better to strengthen the protection of civilian federal government networks, (3) advancing a risk- based approach to supply chain security and exploring new technologies to increase resilience, and (4) preparing for strategic, on-the-horizon challenges and emerging technology such as the transition to post-quantum encryption algorithms. Fair and free elections are a hallmark of American democracy. The American people’s confidence in the value of their vote is principally reliant on the security and resilience of the infrastructure that makes the Nation’s elections possible. Accordingly, an electoral process that is both secure and resilient is a vital national interest and one of the Department of Homeland Security’s highest priorities. The Department’s Cybersecurity and Infrastructure Security Agency (CISA) is committed to working collaboratively with those on the front lines of elections—state and local governments, election officials, federal partners, and vendors—to manage risks to the Nation’s election infrastructure. CISA will remain transparent and agile in its vigorous efforts to secure America’s election infrastructure from new and evolving threats. On May 12, 2021, President Biden signed an Executive Order to improve the nation’s cybersecurity and protect federal government networks following recent cybersecurity incidents exploiting SolarWinds and Microsoft Exchange. This Executive Order makes a significant contribution toward modernizing cybersecurity defenses by protecting federal networks, improving information-sharing between the U.S. government and the private sector on cyber issues, and strengthening the United States’ ability to respond to incidents when they occur. DHS encourages private sector companies to follow the Federal government’s lead and take ambitious measures to augment and align cybersecurity investments with the goal of minimizing future incidents.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Most of the actions outlined in the Executive Order are to be implemented by the Department of Homeland Security, namely CISA. In addition, Congress provided CISA with new authorities in the 2021 National Defense Authorization Act (NDAA) and with a down payment to improve the protection of civilian federal government networks with the funding provided through the American Rescue Plan. This ongoing priority will therefore focus on implementing the Executive Order, the NDAA, and the funding provided by Congress in an effective and timely manner. The Executive Order signed by President Biden in May 2021 focuses on improving software supply chain security by establishing baseline security standards for development of software sold to the government, including requiring developers to maintain greater visibility into their software and making security data publicly available. It stands up a concurrent public-private process to develop new and innovative approaches to secure software development and uses the power of Federal procurement to incentivize the market. Finally, it creates a pilot program to create an “energy star” type of label so the government – and the public at large – can quickly determine whether software was developed securely. Too much of software, including critical software, is shipped with significant vulnerabilities that can be exploited by cyber criminals. The Federal Government will use its purchasing power to drive the market to build security into all software from the ground up. This ongoing priority will focus on implementing this part of the Executive Order. Boutwell (2019) discusses a study that examined cybersecurity tactics that compliance officers and IT managers employ to lessen cyber threats to vital infrastructure. IT managers and compliance officers from four case organizations in the Pacific Northwest of the United States made up the population. The routine activity theory was used in the study, and data was collected through interviews with IT managers, compliance officers, and paperwork on policy management and cybersecurity. Four main themes emerged from the data triangulation process: the need for an extensive worker training program, the significance of infrastructure resiliency being prioritized, the value of security knowledge, and the backing and investment of organizational leadership. The study identified important tactics that might enhance the cybersecurity procedures employed by IT and compliance
specialists, which can lessen the likelihood of successful assaults on vital infrastructure. Positive social change was the result of an investigation and contextual analysis of cybersecurity strategy with situational awareness of IT practices to improve cyber threat mitigation and inform business operations. These results bolster effective cybersecurity tactics for safeguarding vital infrastructure. Boutwell (2019) points out that in 2014, a report from the U.S. House Permanent Select Committee on Intelligence stated that advanced threats are capable and motivated to attack critical infrastructure with the objective of creating a significant impact like impairing or preventing the ability to provide essential resources and services such as fuel, water, and electricity. Desolda, G., Ferro, L. S., Marrella, A., Catarci, T., & Costabile, M. F. (2021) In digital communication, phishing refers to a fraudulent attempt to obtain sensitive information by masquerading as a reliable entity. This type of cyberattack succeeds largely because users are unaware of their vulnerabilities. Desolda et al. (2021) use this article to paint a bigger picture of significant findings on phishing and the human factors surrounding it. An understanding of how human factors should be considered to defend against phishing attacks is influenced by the analysis of the retrieved publications, along with the research questions addressed in the systematic literature review. Desolda et al. (2021) also provide several directions research could go for improvements in the future. McQuaid, P., Britton, B., Minnich, M., Borrelli, D., Baker, J., & Burton, B. (2019) The California Cybersecurity Institute (CCI), a multi-agency project aimed at safeguarding California through improved cybercrime forensics and statewide tactical response training, was established by California Polytechnic State University (Cal Poly), in collaboration with the California National Guard and other government agencies. In order to better safeguard its inhabitants, the institution provides job opportunities for local law enforcement, military personnel, government cybersecurity technical leaders, higher education, and university students. A component of this endeavor is the California Cyber Training Complex (CCTC), a complex of three buildings totaling 120,000 square feet located at the National Guard facility in Camp San Luis Obispo, California. The CCI seeks to create an immersive research and learning environment while educating the present and next cyber workforce. The curriculum provides a framework for innovative cyber security utilizing advanced coursework and fundamental and practical investigations into more recent problems and technological obstacles. Professionals must rethink their approaches, support colleagues in fields other than computer science, and build partnerships with businesses, universities, and governmental organizations in order to meet the difficulties posed by cybersecurity.
A federalized cybersecurity system should be in place and monitored by the Department of Homeland Security (DHS) to ensure the safety of critical national infrastructure held by private firms, such as airlines and power plants. The study that Boutwell (2019) examines will let the reader better understand the importance of having a more federalized approach to cybersecurity protection and define what vital privately held national infrastructures are. In the article, the author reveals critical flaws in the current defense methods and suggests improvements to ensure standardized training and eliminate infiltration with the help of DHS monitoring. Desolda et al. (2021) will further help in expressing the dangers of cyberattacks and how easy it can be to fall victim to a cyberattack despite having a basic understanding of cybersecurity. This will help solidify the fact that protection is needed by more than just an average IT. Desolda et al. (2021) article highlights directions for future improvements in research. Humphreys (2019) discusses the establishment and tasks behind DHS and why it was created and is so important to the United States' protection. McQuaid et al. (2019) provide research on a government infrastructure that is working well and gives a glimpse of what promise could be if cybersecurity protection and defense were federalized. Rehak et al. (2019) discuss the vulnerability of critical infrastructures and how they are only as reliable as the resilience of their elements. This article discusses how to assess an infrastructure's resilience. It goes into grave detail about potential weak points and more. This article can help the reader better understand the concerns surrounding protecting these infrastructures. The U.S. Department of Energy (2020) discusses an initiative that has been a success with the DOE, DHS, and DoD. A key goal of this initiative is to improve information sharing, training, and education, and prepare and respond to cybersecurity threats as a team. The writer of this annotated summary will benefit from each of these sources, along with other sources, in advancing her research.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ex old paper “Finally, all of you, have unity of mind, sympathy, brotherly love, a tender heart, and a humble mind” ( English Standard Version , 1 Peter 3:8, 2011/ 2023 ). “Finally, all of you, have unity of mind, sympathy, brotherly love, a tender heart, and a humble mind” (English Standard Version, 2001/2016, 1 Peter 3:8). Breaking the cycle starts with focusing on the victims. Embracing a biblical worldview may be an effective way to reach out to victims. There are many victims who are either unsure of their worth or believe that they have no value. They are scared, broken, and emotionally and physically abused into thinking that no one cares. A Christian social worker brings a unique set of skills to the field. Policy reform efforts to combat trafficking in persons have been rooted in Christian values and social work. In this capacity, the social worker may be called upon to lead a faith-supported life to assist those who are vulnerable. Naturally, this would not exploit the client relationship and wouldn't involve the social worker's agenda. Human trafficking awareness has become increasingly important to Christians for many reasons. The Biblical worldview regards human trafficking as a violation of human exploitation, sexual morality, and the weak hurting the vulnerable. Combating human trafficking by Christians offers a deeper understanding of its evil nature.