StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How Prepared the United States in Responding to a Cyber Emergency - Case Study Example

Cite this document
Summary
The paper 'How Prepared the United States in Responding to a Cyber Emergency' presents The role played by computers and the internet in modern times that is enormous and cannot be ignored. The benefits associated with these technologies are enormous…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
How Prepared the United States in Responding to a Cyber Emergency
Read Text Preview

Extract of sample "How Prepared the United States in Responding to a Cyber Emergency"

Is the U.S. ready for a cyber emergency? Lecturer Introduction The role played by computers and the internet in the modern times is enormous and cannot be ignored. The benefits associated with these technologies are enormous, and this has generally contributed to the growth of cyberspace (Uma & Padmavathi, 2013). Unfortunately, this technology is being used by individuals to cause damage and exploit others. Such individuals may use this technology to access private information, disable networks and steal data (Uma & Padmavathi, 2013). This problem is what is termed to as a cyber attack. Whereas a number of measures may be put in place to prevent such attacks, it is not entirely possible to completely eliminate the possibility of such attacks happenings. This makes it necessary for organizations and governments to be prepared to deal with such emergencies. This paper attempts to evaluate how prepared the United States is in responding to a cyber emergency. Issues associated with cyber emergency Cases of cyber attacks against important infrastructure in the United States have been on the increase. These attacks do just affects a single department or machine but instead affect the entire economy, national security and social lives. Computer networks have become a critical component of the national infrastructure. According to a statement given to the Committee on Homeland Security in 2012 by Gregory Wilshusen, the director of Information Security Issues, the country faces a number of cyber threats from different sources. These threats can either be intentional or unintentional. The unintentional sources include software upgrades and defective equipment that may affect systems. However, most of these threats are intentional, and these come from criminal groups, terrorists, hackers, foreign nations and insiders (Wilshusen, 2012). These threats have increased the vulnerabilities of critical federal systems and infrastructure. These threats have significant effects to the operations of the government and related departments. These include: loss of resources, inappropriate and unauthorized access to critical information, and disruption of government operations and undermining of the missions of the government (Wilshusen, 2012). The ability of the government to deal with such attacks depends on the overall preparedness in three key areas. The first is risk management, which mainly involves understanding the different security risks and how they affect the government and the population at large. This involves identifying the key assets, analyzing and classifying the threats and understanding the impact of a security threat (Government Technology, 2011). The second component of cyber emergency preparedness is compliance. The government has to ensure that all departments and organizations comply with the relevant laws and regulations regarding cyber security. Finally, there is need to have training programs in order to ensure that all government agencies and department have qualified personnel who understand these risks and how to avoid them (Government Technology, 2011). Employees need to understand the security policies and understand how to use computer systems and devices safely. These three main components are the basis of cyber emergency preparedness. Based on these issues, the section below analyses how prepared the United States is in dealing with cyber emergencies. This analysis is based on the steps taken by the various government agencies and bodies to enhance cyber security. Analysis The National Preparedness Report of 2013 highlights two major findings related to cyber security preparedness. First, the report notes that the Federal Government and private sector are increasingly working together in responding to cyber incidents. However, this partnership is yet to expand to the owners of critical infrastructure and operators (Homeland Security, 2013). Secondly, the report shows that states have low awareness risks to the information systems they use. According to the State Chief Information Security Officers (CISOs), this is attributed to low funding and lack of skilled staff (Homeland Security, 2013). Many federal agencies struggle to attract and retain the necessary cyber security talent and also find it difficult to develop staff members. These findings indicate that although there are a number of steps being taken to prepare the country for cyber emergencies, there is a lot that needs to be done. According to a study conducted by the United States Government Accountability Office (GAO) (2013), it was observed that while the federal government has taken measures to enhance the country’s ability to deal with cyber threats, a number of key issues remain unaddressed. First, there are limitations in assessing risks, development of controls and the monitoring of results in the federal government as well as the critical infrastructure (GAO, 2013). For instance, the report shows that only 8 out of the 22 major agencies comply with the risk management requirements set under the Federal Information Security Management Act (FISMA) (GAO, 2013). Secondly, the report shows that although the Department of Homeland Security has made progress in the coordination of the federal government’s response to cyber incidents, the sharing of information among the various federal agencies and the private sector remains poor (GAO, 2013). There is lack of a central information system, and this hinders the ability of the government to respond to such attacks. Third, although some progress has been made in understanding and addressing international cyber security challenges, the approach taken by the government in international cyber security challenges is not well implemented. The government lacks a clear international strategy that has clear performance metrics and timeframes (GAO, 2013). This has made it difficult for the government to set and achieve clear objectives relating to international cyber security threats. Fourth, most of the agencies involves in strategic planning such as the Department of Homeland Security and the Office of Personnel Management lack adequate training programs for the cyber security workforce (GAO, 2013). Finally, the report finds that research and development initiatives in the field of cyber security are relatively limited. This is attributed to the poor sharing of information and the inability to effectively monitor R&D projects countrywide. This has made it difficult for the country to develop the necessary skills and innovations that might help in dealing with cyber security threats. The results of this study show that the government has yet to fully address the major issues related to cyber security management. One of the major trends surfacing is the inability of the different federal agencies to train and maintain qualified personnel specialized in cyber security (Roulo, 2012). In addition, the information sharing between the government agencies and the private sector is still wanting. In a report prepared by Sen. Tom Coburn (2014) on the track record of the federal government on cyber security and critical infrastructure, the author identifies some of the trends by the key agencies in relation of cyber security emergency preparedness. The results show that most the government agencies, inducing those that hold large volumes of sensitive data, are vulnerable to cyber attacks. This is because the organizations have failed to take the basic steps in ensuring that their systems are secured. For example, the Department of Homeland Security (DHS) protects sensitive databases with very weak or default passwords (Coburn, 2014). In addition, the computers that control access to the various DHS facilities had their software out of date. The Nuclear Regulation Commission, which is an example of an agency that maintains large volumes of sensitive data, is also highly vulnerable. For example, most of the data is stored to a shared drive that is not secured. Some of the data stored on such drives include the agency’s cyber security programs and the Commissioner’s home address and phone number (Coburn, 2014). These trends indicate that even the most sensitive agencies and those charged with the responsibility of marinating national security still fail to comply with the basic requirements of cyber security. These further show how the government and related agencies are not well prepared to handle cyber emergencies. Conclusion Based on the analysis above, it can be concluded that although the government has taken measures to identify, assess, prevent and deal with cyber threats, there are a number of key issues that need to be addressed. Two among them is the inability of the government agencies to effectively share information with the private sector and the lack of adequate trained staff in these agencies. The implementation and monitoring of the various regulations and polices related to cyber security remains poor. This generally exposes the country to cyber attacks. In the event of a cyber disaster, the country is not fully prepared to deal with such and minimize damage and loss of information. There is need for the government to ensure that all the policies developed are followed and monitored. References Coburn, T (2014). The Federal Government’s Track Record on Cyber security and Critical Infrastructure. Pp. 1-19. Retrieved on 23 March 2014 from http://www.coburn.senate.gov/public/index.cfm?a=Files.Serve&File_id=f1d97a51-aca9- 499f-a516-28eb872748c0 Government Technology (2011). Cyber Security Essentials for State and Local Government. e- Republic. Pp. 1-26 Homeland Security (2013). National Preparedness Report. Retrieved on 23 March 2014 from https://www.llis.dhs.gov/sites/default/files/npr2013_final.pdf Roulo, C (2012).Cybercom Chief: U.S. Unprepared for Serious Cyber Attacks. US Department of Defense. American Forces Press Service. Retrieved on 23 March 2014 from http://www.defense.gov/news/newsarticle.aspx?id=117289 Uma, M and Padmavathi, G (2013). A Survey on Various Cyber Attacks and their Classification. International Journal of Network Security, 15(6), Pp.391-397 US Government Accountability Office (GAO) (2013). Cyber Security: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented. Report to Congressional Addressees Wilshusen, G (2012). Cyber security: Threats Impacting the Nation. Testimony before the Subcommittee on Oversight, Investigations, and Management, Committee on Homeland Security, House of Representatives. United States Government Accountability Office. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(How Prepared the United States in Responding to a Cyber Emergency Case Study Example | Topics and Well Written Essays - 1250 words, n.d.)
How Prepared the United States in Responding to a Cyber Emergency Case Study Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1816113-is-the-us-ready-for-a-cyber-emergency
(How Prepared the United States in Responding to a Cyber Emergency Case Study Example | Topics and Well Written Essays - 1250 Words)
How Prepared the United States in Responding to a Cyber Emergency Case Study Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1816113-is-the-us-ready-for-a-cyber-emergency.
“How Prepared the United States in Responding to a Cyber Emergency Case Study Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1816113-is-the-us-ready-for-a-cyber-emergency.
  • Cited: 0 times

CHECK THESE SAMPLES OF How Prepared the United States in Responding to a Cyber Emergency

The United States Department of Defense

Data from the united states Department of Defense puts the number of active duty personnel in United States Army of the day at a conservative 1.... the united states Department of Defense An overview of the united states invasion in Iraq by the Bush administration can help one to gain an insight of why the contemporary US military needs to embrace the draft.... The underlying argument is that united states does not require a bigger standing army but rather a deep bench of well-trained soldiers who can be mobilized from their reserves to address the unpredictable but inescapable wars and other necessary humanitarian interventions of the future....
5 Pages (1250 words) Essay

The United States Defense Crisis Action System

the united states Defense Crisis Action System The Crisis Action System adopted by the united states Defense Strategy is implied in the Crisis Action Planning Process adopted by the Joint Chiefs of Staff (1999, p.... Sixth, the united states Transportation Command (USTRANSCOM) prepares deployment estimates based on the COAs (Joint Task Force, 1999, p.... Third, the NCA, CJCS, and other members of the Joint Chiefs of Staff will have to analyze a situation whether a military option or solution should be prepared and whether the event should progress to the next levels or components of the critical action system (Joint Task Force, 1999, p....
5 Pages (1250 words) Essay

Ways that Airports Can Prepare for and Respond to Aircraft Accidents

in responding to the accidents, the airport must keep up-to-date records of all contact institutions that can offer assistance during an occurrence of such accidents.... It is therefore extremely important for the airport to put in place guidelines and procedures of preparing for and responding to such accidents in case they occur.... The author of the paper describes the ways that airports can prepare for and respond to aircraft accidents and concludes that a successful response of the airport during an accident is determined on how prepared they are and this can be gained by the guidelines....
1 Pages (250 words) Assignment

Controlling the Cyber-conduct of Young People

Supreme Court of the united states.... It is unwise to monitor and control the cyber-conduct of young people because the children whose use of technology is closely monitored do not learn to use new technologies responsibly in other contexts. c.... The evidence supports the claim fully because it shows that children… Moreover, it becomes evident that the brain of young people is not fully developed and that they are more likely to act on impulses. While some people claim Controlling the cyber-conduct of Young People Paper Topic: Controlling the cyber-behavior of youngsters a....
1 Pages (250 words) Essay

Emergency Management

The reading introduces the challenges that follow appointment as emergency Management emergency Management Q The aims at underlining the centrality of the NEMA handbook as a guide for emergency management directors.... Preparedness relates to those activities; actions or strategies layout by emergency leaders in preparation for unforeseen disasters and emergencies.... A good example of preparedness is training of emergency management personnel....
1 Pages (250 words) Assignment

How Typical Students Are Prepared For The real World

I have a cardinal rule in my life that states that 'planning brings success.... How Typical Are prepared For The real World Introduction The schools and colleges are crucial s that indoctrinate withrelevant skills that enable them venture into the outside world....
2 Pages (500 words) Essay

A Humanitarian Mission Outside of the United States

This paper will deal with an assumed scenario involving the deployment of troops to assist in a humanitarian mission outside of the united states.... The government of Guam has notified the united states government regarding the earthquake and has asked for humanitarian assistance.... The President of the united states is expected to shortly get to the airwaves to address the situation in Guam.... Meanwhile, a decision has been made to send in troops from the united states Marine Core (USMC) and the united states Navy in order to help the people of Guam....
7 Pages (1750 words) Research Paper

Comprehensive Security Plan

This paper “Comprehensive Security Plan” is designed to look into the security plan of the New York public library.... The library has almost 53 million items.... Thus, it is the second-largest public library in the entire US.... It is an independently managed NGO that has both private and public financing....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us