Preview

Emerging Cybersecurity Technologies and

Best Essays
Open Document
Open Document
1960 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Emerging Cybersecurity Technologies and
Emerging Cybersecurity Technologies and Policies within National Security Defense

By: John Haley

Table of Contents

1. Introduction
2. Cybersecurity Technology
3. Features of New Technology
4. Role of Federal Government in Development
5. Federal Government: Positive or Negative?
6. Conclusion

References
1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu
2. Greenberg, A. (2013). President Obama's Cybersecurity Executive Order Scores Much Better Than CISPA On Privacy. Forbes.Com, 32.
3. Hoover, J. N. (2011, November 7). DARPA boosts cybersecurity research spending 50%. Information Week. Retrieved from "http://www.informationweek.com/news/government/security/231902495"
4. Kramer, F., Star, S., & Wentz, L. (2009). Cyberpower and national security. Potomac Books,Inc
5. Nye, J. (2008, December 10). Cyber insecurity. Retrieved from: "http://www.project-syndicate.org/commentary/nye65/English"
6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-
7. Chan, E., Chaugule, A., Larson, K. and Campbell, R. (2010). Performing Live Forensics on Insider Attacks. CAE Workshop. Illinois University
8. Rogers, E. M., Carayannis, E. G., Kurihara, K., & Allbritton, M. M. (1998). Cooperative Research and Development Agreements (CRADAs) as technology transfer mechanisms. R&D Management, 28(2), 79
9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm

Introduction

In order to protect our national infrastructure and the vital private information of our citizens from hackers, enemy



References: 1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu 2 3. Hoover, J. N. (2011, November 7). DARPA boosts cybersecurity research spending 50%. Information Week. Retrieved from "http://www.informationweek.com/news/government/security/231902495" 4 5. Nye, J. (2008, December 10). Cyber insecurity. Retrieved from: "http://www.project-syndicate.org/commentary/nye65/English" 6 7. Chan, E., Chaugule, A., Larson, K. and Campbell, R. (2010). Performing Live Forensics on Insider Attacks. CAE Workshop. Illinois University 8 9. U.S. Department of Homeland Security (2003). Homeland Security Presidential Directive 7: Critical infrastructure identification, prioritization, and protection. Retrieved from http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm Introduction

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    Additionally, the directives describe the process that the Department of Homeland Security should use to tackle the protection of critical infrastructure. Moreover, it outlines a summary of the activities, which should be undertaken to define and prioritize critical infrastructure, coordinate protection, as well as reduce the susceptibility of critical infrastructure or the essential resources (Loeb,…

    • 501 Words
    • 3 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Best Essays

    Sarbane-Oxley Act of 2002

    • 3019 Words
    • 11 Pages

    [8] Kochems, Alane. “Who’s on First? A Strategy for Protection Critical Infrastructure. May 5, 2005. Accessed April 9, 2009 from: The Hertiage Foundation website at http://www.heritage.org/research/homelandsecurity/bg1851.cfm…

    • 3019 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A Policy Brief of NSA Reform

    • 3654 Words
    • 12 Pages

    Reitman, Rainey. "86 Civil Liberties Groups and Internet Companies Demand an End to NSA Spying." Electronic Frontier Foundation. N.p., 10 June 2013. Web. 23 Nov. 2014.…

    • 3654 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Human factors can influence policy choices for both domestic and international cybersecurity issues. What will be discussed in this paper is how human factors can affect four selected cybersecurity issues. The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property. This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned.…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Federal Tort Claims Act

    • 1331 Words
    • 6 Pages

    Assistant Secretary of Defense for Homeland Defense and America 's Security Affairs. (n.d.). Retrieved September 22, 2004 from http://policy.defense.gov…

    • 1331 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    The 2010 National Security Strategy states that homeland security is “a seamless coordination among federal, state, and local governments to prevent, protect against, and respond to threats and natural disasters (Reese, 2010). Homeland security demands organization since various federal, state, and local entities have responsibility for numerous homeland security activities. The increase of responsibilities titled to homeland security undertakings is for several reasons. One reason homeland security established from the pre-9/11 view of…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays