StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Geographic Information System - Essay Example

Cite this document
Summary
The paper "Geographic Information System" discusses that by integrating the current Esri and RedSeal capabilities, the organizations pursue to recognize the crucial devices for each operation and then exactly recognize the attack surface for every device…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Geographic Information System
Read Text Preview

Extract of sample "Geographic Information System"

Geographic Information System Geographic Information System always plays a progressing function in (GEOINT) geospatial intelligence. GIS technologies permit a user to proficiently analyze, produce and manage geospatial, to pool GEOINT with other methods of intelligence gathering and to achieve extremely advanced analysis and visual products of geospatial data. Consequently, GIS produces contemporary and more dependable GEOINT to minimize doubt for a decision maker (Buxbaum, p.1). Because GIS programs are Web-based, an end-user can regularly work with a decision maker to unravel national security and GEOINT associated challenges anywhere in the domain. There are numerous brands of GIS software employed in GEOINT and cyber security, namely; Google Earth, ERDAS IMAGINE, GeoNetwork open source and Esri ArcGIS. This essay focuses on the Geographic Information System capabilities of current cyber security products. Geo-spatial Intelligence Cyber security In the middle of a developing awareness that the geospatial facet of IT framework can play a vital role in protecting systems and networks, several companies are creating contributions that integrate those two facets. The rational mapping of cyber-framework has been regarded a good exercise for securing and controlling data and network assets for momentarily. This sort of mapping displays how assets are integrated in cyberspace and how information is transferred from one location on the network to the other without esteem to their physical closeness. Furthermore, a geospatial facet to network mapping may appear redundant at first, because the security highlighting in past few years has been to adopt layers of software (Trendmicro, 1). Geospatial technology can be implemented anywhere in cyberspace from a central control setup. Comprehending the coming together of cyber security and geospatial intelligence starts with the fact that not all attacks to IT infrastructure happen in cyberspace. Deeds of damage or combat or natural calamities can have an effect on wide-ranging systems and networks. Understanding where these are happening in the geographical world allows companies to repair them and work around bleached infrastructure constituents until they are repaired. It also facilitates companies to implement geographical 2fences to cyber-assets (Buxbaum, 1). Apart from that, integrating cyber security with geospatial enables a much more complex comprehension of systems and their attacks and liabilities than the rational mapping. Identifying the geospatial site of the source of a threat can give hints about who are the perpetrators of producing the threats and what they are after, stimulating a suitable response. Employing systems that integrate cyber-data and geospatial lets analysts to apprehend the effect of geographical acts on cybersecurity. Geo-spatial mapping features An end-user can in-put various types of data in map form into a GIS to initiate their analysis, for instance (USGS) United States Geological Survey, contour lines, geologic maps, topographic maps, elevation maps, digital line graph data, and satellite imagery. An operator can also change digital information into systems that a GIS can recognize and use, such as Microsoft Excel files or census tabular data. If the information is analogue, then operators will require using numerous methods to capture the information for instance, digitizing maps through a digitizing tablet to collect feature coordinates, using hand-tracing with a computer mouse, uploading (GPS) Global Positioning System coordinates or employing electronic scanners (Trendmicro, 1). GIS permits the operators to seize, analyse, exploit, visualize and manage physically referenced data, geographical features and other geospatial information. Therefore, GIS is a crucial infrastructure for the national security community and GEOINT in controlling and translating spatial facts in an information system. Geospatial data removes real world physical or other data into datasets, metadata, maps, workflow models and data models within a geo-database employ to resolve GEOINT-associated challenges. GIS offers a structure for data and map production that permits an operator to increase other data sources, such as UAV imagery or satellite, as fresh layers to a geodatabase. Geodatabase can be dispersed and functioned across any network of related operator and produces a mutual spatial capability for all intelligence and defense domains (Baumann, 1). GIS has the capability of fusing geospatial information with other sorts of intelligence clusters, like, human intelligence or open source intelligence, measurement and signature intelligence signals intelligence. A GIS operator can integrate and incorporate all of these kinds of intelligence into systems that offer integrated GEOINT throughout a company’s information system. GIS allows proficient organization of geospatial data, the integration of geospatial data with other kinds of intelligence collection and progressive analysis and also visual manufacture of geospatial data. This manufactures rapid, integrated and more consistent GEOINT that focuses to minimize doubt among decision maker (Baumann, 1). Analysis of the Geo-spatial Technology RedSeal Networks, a cyber-defense company, is engaged in a dual scheme with Esri, the manufacturers of ArcGIS, to combine two of their systems to create just such a mutual picture. To comprehend if there are breaches in cyber-security, one requires a cyber-analysis. Once you get the breach, one strategy is to observe the region for rare deed with a measuring device. The GIS application is offering a mutual framework to incorporate data from different deeds in the effort to allow improved decision-making. Cyber-conflicts and occurrences can have physical impact. A space-time framework can offer a distinct model that brings into line with these different events. Knowledge of the site of the source of cyber-threats allows an enhanced comprehension of those threats (Buxbaum, 1). Most perpetrators from Eastern Europe sphere are normally getting illegal access for financial data while as, hackers from China are gaining access illegally for technological purposes. Right of entry to particular databases and websites can also provide hints. All of this data can assist in an analysis of data that may be conceded or exposed and where a company requires to shore up security. Joining cybersecurity and geospatial capabilities can offer the framework that can permit cyber-professionals to rapidly classify significant cyber happenings. For instance, a company’s invasion recognition system may produce notifications on 1,000 doubtful dealings (Buxbaum, 1). Monitoring the notifications in a list of destination and source IP addresses doesn’t minimize the doubt concerning how the invasions affect the company’s mission or whether the invasions constitute a threat. However, if we produce framework by arranging in a line IP addresses to structural role, then we can start to relate each doubtful deeds to those roles. If the notifications are focused within a specific institutional role such as development and research, the hackers are probable threatened by a rival attempt of steal intellectual property. In this instance, counting a single non-cyber variable, office role, offers a framework that steers us to draw significantly dissimilar deductions. This capability to produce different assessments by gathering cyber-data, covering it on a GIS framework and trending within that framework could enhance administrative quickness in evaluating and reacting applicably to cyber-attacks (Baumann, 1). Conclusion Identical merging can also help in forecasting the next sequence of attacks, the geospatial element helps in comprehending how a hacker can find another arrangement of system to attack by shooting ahead and getting through advanced levels of securities. The Esri-RedSeal Corporation intends to merge ArcGIS with RedSeal’s cyber security capabilities. The strong suit of RedSeal’s software depends on its capability to scrutinize configuration files to generate models of the association of network constituents to each other (UK Launches New Cyber Security Strategy, 1). This permits computer security groups to consolidate their work centered on the harm that could be triggered by a bleached host rather than positioning centered on the attack variety. This offers a means to support protection in gravity by contradicting adversary movement at the balancing section rather than an institution most crucial devices. Integrating the current Esri and RedSeal capabilities, the organizations pursue to recognize the crucial devices for each operation and then exactly recognize the attack surface for every device. This will permit security personnel to remediate and identify weaknesses earlier the mission data flows are affected (Buxbaum, 1). Works Cited Baumann, Jim. Esri And Redseal Bring Geospatial Analysis To Network Security. Esri.com. N.p., 2015. Web. 11 May 2015. Buxbaum, Peter. GEOINT For Cybersecurity. Kmimediagroup.com. N.p., 2014. Web. 11 May 2015. Trendmicro.com,. Cyber Security Management - Trend Micro USA. N.p., 2015. Web. 11 May 2015. UK Launches New Cyber Security Strategy. Computer Fraud & Security 2011.12 (2011): 3. Web. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Internship Question Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1693997-internship-question
(Internship Question Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1693997-internship-question.
“Internship Question Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1693997-internship-question.
  • Cited: 0 times

CHECK THESE SAMPLES OF Geographic Information System

Geographic Information System on a civil engineering

Name of student: Course: Tutor: Geographic Information System on Civil Engineering Abstract This research paper assesses the requirements of GIS in civil engineering.... Introduction The GIS (Geographic Information System) is a modern scientific system and software capable of acquiring or capturing, recording, integrating and present in more clearly and understandable format for all geographic data.... Any application information system that has the ability to capture, integrate, analyze and display in such formats that can be understood is called GIS (Chang 2008)....
10 Pages (2500 words) Research Paper

The Geographic Information System Program

The paper 'The Geographic Information System Program' will discuss creative innovations, which have found their way into the human way of life, with computers considered the most important in the history.... The application of the geographical information system is preceded by the art of making maps where GIS sought to modernize the trade.... GIS also includes a communication system that allows linking of various stations for comprehensive data collection....
6 Pages (1500 words) Research Paper

Geographical Information System and Land Development

A Geographic Information System, GIS, is a computerized designed system designed to store, capture, manipulate, scrutinize, retrieve, handle, and present all kinds of spatial or geographical data (Pierce and David, 1).... Geographic Information System (GIS) software applies relational database management technologies to consign a series of attributes to every spatial characteristic (Longley et al 86).... nother aspect of Geographic Information System (GIS) is that it provides the capability to coalesce series of data into a multiple data layer that may later be a base layer in the database....
4 Pages (1000 words) Research Paper

Geographic Information System Approach

This work called "Geographic Information System Approach" describes the use of a Geographic Information System (GIS) in investigating how social services are employed in community-based interventions.... he author aims to explain geographic information Systems in terms of Marshall McLuhan's theories of media.... 6)To be able to answer these questions, the authors gathered their data from the management information systems of CHPP and Philadelphia's, focus city of the study, a centralized public shelter system which is called Office of Emergency and Shelter Services (OESS)....
12 Pages (3000 words) Research Proposal

The Quality Control of Geographic Information System QC Process

"The Quality Control of Geographic Information System QC Process" paper contains a research proposal of the project the findings from which will be analyzed and then used to validate the concepts gained from the experiments and the literature reviews.... According to USGS (4), the functionality of the new digital version can significantly be enhanced when it is used together with some digital mapping and analysis applications, particularly the Geographic Information System(GIS) software....
6 Pages (1500 words) Research Proposal

Implementing a Geographic Information System for Water & Sewerage Company

This paper presents the design and implementation of a Geographic Information System (GIS) for the Water and Sewerage Company for the City of Nairobi, Kenya.... This is to help to efficiently manage their utility distribution systems and replace the existing system.... The Water & Sewer Company was the focus of this research and system design.... ince the main purposes of the Water Company are provision of clean, pure drinking water to residents, maintain water distribution system and add new connections lines, a GIS application system is necessary for effectiveness of the water company....
6 Pages (1500 words) Research Paper

Geographic Information System and other Spatial Data Handling Technologies

The paper "Geographic Information System and other Spatial Data Handling Technologies" observes GIS as an innovative method of solving different problems with an ability to convert existing digital information into various forms that are recognizable and easy to use.... GIS stands for Geographic Information System.... In order to identify the definition for GIS, the actual definition should encompass three distinct concepts: information system about the problem in question, databases describing the information system, and the information technology applied in the concept like the software....
8 Pages (2000 words) Term Paper

A Geographic Information System: Icloud

"A Geographic Information System: Icloud" paper examines GIS software on the cloud that has many advantages that accelerate the shift to cloud-based GIS.... Unlike existing GIS software, the GIS cloud can make the process of integrating GIS information easy and less expensive.... Cloud computing provides a delivery method for geospatial capabilities to line-of-business information and enterprise information systems....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us