Preview

Cmgt 441 Homeland Security Research Paper

Better Essays
Open Document
Open Document
1317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 441 Homeland Security Research Paper
Homeland Security Today’s Attack Prevention: Effective for Businesses?
CMGT/441 Introduction to Information Systems Management

A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012
…show more content…
The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Best Essays

    Having well-developed protocols on issues of security, as well as utilizing such well-developed protocols as part of a strategy in attending to security issues, and periodically reviewing such utilized security protocols as time passes-by in order to increase efficiency is the most enduring way to keep enriching the practices of , and in strengthening US homeland security. Due to lack of a single security protocol that could be utilized effectively in attending to all issues pertaining to security, the US government has continued to developing new security protocols, and equally deploys Existing Security Instruments (ESI) such as the…

    • 2640 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The Homeland Security Act of 2002 established the Department of Homeland Security in the wake of the terrorist attacks on September 11th, 2001. The perview of The Department of Homeland Security is to help prevent, respond to, and recover from terrorist attacks within the United Sates. In addition, the department is also responsible for helping to maintain economic stability and prevent drug trafficking, especially when it relates to terrorism.…

    • 147 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In the article Flynn (2011) is calling upon the government to mobilize its citizens to prepare for disaster by developing a homeland strategy against terrorism. The author criticizes the government’s plan to prohibit the sharing of information on threats and vulnerabilities with the general public. Flynn notes that the government has isolated the department officials from the people they serve, a move he terms as the wrong approach to protecting the homeland. Flynn opines that the federal agencies are unable to detect and intercept acts of terrorism. Since the government has trained professionals to respond to terror attacks, the author points out that the first responders to a terror incident are the sidewalk T-shirt vendors or passersby,…

    • 872 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    After the attacks of September 11, 2001, the United States system went through a change in reforming government agencies to protect the American borders against any threats. The government established the Department of Homeland Security, which mission is to protect America borders against external or internal threats that could potential cause harm in our nation. Since the Department of Homeland Security continues improving the national security protection of this nation by establishing effective programs and activities…

    • 2663 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    One of the major responsibilities the President is known to have would be that of protecting the people. The Department of Homeland Security was established in response to the biggest terrorist attack on U.S. soil on September 11, 2001. This attack sparked the nation and caused fear among citizens as well as opening eyes of the government to how much stronger the security level had to be in the country. U.S. officials began to reconstruct the Office of Homeland Security once they recognized their shortcomings.…

    • 256 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Counterterrorism Paper

    • 4321 Words
    • 12 Pages

    Colombia's government and the rebel group FARC reached an agreement May 17, 2014 on ending the illegal drug trade. The deal called for FARC to cooperate with the government in convincing farmers to grow crops other than coca, which is used to make cocaine. The announcement was made Friday in Havana where the two sides have been negotiating an end to a 50-year-old insurgency. Colombia was the world's leading producer of cocaine until Peru recently overtook it in cultivation of coca. The cocaine industry has been the major source of funds for the Marxist rebel group and a cause of crime and instability in the South American country. With the agreement on ending the drug trade, the two sides have resolved three of the six points on their agenda. Previously FARC and the government had reached deals on agrarian reform and political participation.…

    • 4321 Words
    • 12 Pages
    Good Essays
  • Good Essays

    The United States have endure deadly attacks from international terrorism and from destructive natural disaster on American soil from 9/11 attacks. Homeland Security has responded by making the U.S. grounds safer and stronger for the Americans. Homeland Security is better prepared to address the full range of threats that include man-made accidents and terrorist threats.…

    • 944 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The specific agency operating under The Department of Homeland Security I choose to research was the United States Secret Service. The USSS is a federal law enforcement agency that was operated under the US Department of Treasury before it was adopted by the department of Homeland Security. Many people, including myself up until now, just think that the Secret Service is the US Presidents personal guard. They have much more responsibility then that. Other then the President, they also provide security for past Presidents, Vice presidents, visiting heads of state, presidential candidates, and foreign embassies, as well as their families. They are also responsible for financial crimes, including things like counterfeit U.S currency, U.S treasury…

    • 535 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Established after the 9/11 attacks against America, the U.S. Department of Homeland Security mission involved defending against terrorism, safeguarding the borders, imposing immigration rulings, developing readiness for reaction to and resurgence from tragedies within the U.S. territories. The Homeland Security Act of 2002 was ratified to assist the Department of Homeland Security in assimilating several agencies which integrates twenty-two government bureaus into a single organization. The burdens of the Department of Homeland Security have by no means been larger and the new terrorizations challenges America face entails an inventive and decisive result. At present, the threat depiction presents an enemy who acclimatizes, evolves and is determined…

    • 1373 Words
    • 6 Pages
    Powerful Essays

Related Topics