Preview

Computer Forensics: Cyber Terrorism

Good Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Forensics: Cyber Terrorism
When I think of a cyber threat I am thinking of planes falling. Some new and deadly dieses like the T-virus. All the money in the USA will be worthless. I believe this will be a land of confusion, if we have a cyber-attack. Do we have a plan for a cyber terrorism?

In Computer Forensics, they metation some ways to combating cyberterrorism. They are Presidential Policy Directive 21, ICS_CERT, Cybersecurity Act of 2012, and Executive Order 13636. Presidential Policy Directive 21 is “The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure.” This is mostly own and operated by the state and local governments, and private sectors. This is a share responsibility of public and private entities.
…show more content…
Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures.” Cybersecurity Act of 2012 is “To enhance the security and resiliency of the cyber and communications infrastructure of the United States.” Some of the things this act covers are commercial information about technology product. Covers a commercial item, covered critical infrastructure. This also covers system and asset, also covers the department (or Homeland Security). The Federal agency, federal information infrastructure. And many more to this

You May Also Find These Documents Helpful

  • Good Essays

    Additionally, the departments are to take steps to protect the identified infrastructure and resources (U.S. Government Printing Office, 2008). The directive identifies important infrastructure and major resource sectors and assigning responsibility for each. It mandated the Department of Homeland Security to coordinate the overall program. The directive gives instructions to the federal departments to develop guidelines for protecting critical infrastructure as well as key resources from cyber-attacks.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Good Essays

    * Receive the equipment from the Seattle Police Department with the chain of custody form…

    • 799 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Digital Forensics Lab 4

    • 510 Words
    • 4 Pages

    1. Bid rigging is well rigging a bid so that a certain firm will win the bid.…

    • 510 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The September 11, 2001 attack by the Al-Qaida terrorists was a great challenge to the American government than any other disaster that had occurred in the past decades. The government was threatened to an extent that any possible future attacks that had been suggested by this terrorist group had to be dealt with before it could actually be perpetrated against the American citizens. Since the days of 9/11, the nation has spent a reported $635.9 billion on homeland security and has implemented many changes, strategies and processes to better prepare our nations Security. The government had few institutions that would have coped with this disaster before it happened but thereafter, it has moved towards solving this problem by establishing several institutions and initiatives including the U.S.A. Patriot Act, the Homeland Security Act, the Department of Homeland Security, the National Incident Management System, Homeland Security Presidential Directives 5 and 8, and the Transportation Security Administration, all aimed at countering any intended attacks whether within the country or abroad. Their implementations are at local level as well as state and federal level.…

    • 1848 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Many cases of data and identity thefts only show the vulnerability of Americans in terms of the protection of their personal data. With the purpose of addressing these challenges, St. Louis County is responsible to play a part in protecting the country by the enforcement of a cyber-crime unit that is able to assist government institutions, businesses, and citizens to fight against cyber terrorism. The thought is that this will develop into a larger defense strategy which can be linked with other agencies like local law enforcements agencies, police departments, DHS, CIA, ATB, ICE, and FBI. The three most risky cybercrimes affecting citizens in the St. Louis County are known to be sexual solicitation, identity theft, and cyber-attacks affecting individual computers or the networks. In order to protect the county from these crimes the police commissioner has been me to put together and build a special cyber-crime task…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    This unit provides the knowledge that forms the basis of effective communication and professional relationships with children, young people and adults. Learners will find out how to adapt their communication to suit the age or developmental stage of the person they are interacting with. The unit also covers the legislation, policies and procedures concerned with confidentiality, data protection and the disclosure of information.…

    • 3434 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    Welcome to the course

    • 3699 Words
    • 15 Pages

    This course will analyze the history and many dimensions of national security before and after 9/11. It will also provide a comprehensive and interdisciplinary critique of the concepts of threats and responses and explore the nature of various threats. The course will compare and contrast how to conduct threat assessment using the concept of threats using the included practical risk assessment tool for emergency managers. It will also look at assessing and defending against cyber-terrorism and cyber-warfare to include how information can be used as a weapon. This course is a prerequisite to HSM430, Intelligence Gathering and Crime Analysis.…

    • 3699 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    In order to answer the research questions, the monograph will examine the Department of Homeland Security’s. The monograph will also explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. Also, the description of the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure will be explained. The monograph will further evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure, and suggestions on methods improving the protection of our critical infrastructure and justifications recommendation will also be elaborated on (University of Strayer Materials, May, 2013).…

    • 1279 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The purpose of this plan protects the American people and their interest by training and identifying scenarios where threats are present, or action may be required. The plan stated in its publication to “Build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation’s CIKR, and to strengthen national preparedness, timely response, and rapid recovery of CIKR in the event of an attack, natural disaster, or other emergency.” Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards. Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure – including assets, networks, and systems – that are vital to public confidence and the Nation’s safety, prosperity, and well-being. This endeavor is a shared responsibility among Federal, state, local, tribal, and territorial entities, and public and private owners and operators of critical infrastructure.(DHS, 2009) This plan focuses on actual, potential, or threatened interference with, attack on, compromise of, or incapacitation…

    • 2199 Words
    • 9 Pages
    Better Essays