discussion 6

.docx

School

Liberty University *

*We aren’t endorsed by this school

Course

HLSC 530

Subject

Information Systems

Date

May 11, 2024

Type

docx

Pages

4

Uploaded by son123456 on coursehero.com

Quandary 1 – Kilroy: Chapter 8 and Ramsay, Kiltz: Chapter 5.2 After having read the assigned chapter and your own research what are the potential consequences we face from cyber intrusions or attacks? What are our defenses against such attacks? Quandary 2 – Ramsay, Kiltz: Chapter 6 After having read the assigned chapters and your own research what threats or hazards does our transportation system face or pose? List at list 3 specific modes of transportation and the specific threats each one faces. Provide at least 2 mitigation strategies for each mode and threat faced – 1 structural and 1 non-structural in nature. Does the Bible offer guidance about withstanding the storms we face in life if so what does it say? Quandary 1 Cybersecurity is now a global priority as cybercrime and digital threats grow in frequency and complexity. Cybercrime is any criminal activity committed using computers or network providers (Kilroy, 2018). Also, these threats can take various insidious forms and can very quickly compromise the security and privacy of individuals, businesses, and government agencies such as credit card fraud, identity theft, and illegal money transfers. Moreover, cyber criminals are very sophisticated and can cause great damage in terms of homeland security. In order to assess the abilities of federal, state, and local government agencies to respond to a cyber- attack, the Department of Homeland Security’s Cyber Security Division created an exercise called Cyber Storm (Kilroy, 2018). Adverse effects of cyber-attacks on the United States include digital, economic, psychological, reputational, and social. Physical impacts include loss of life, bodily injury, and identity theft. Economic impacts include investigative costs, compensation payments, extortion payments, and reduced customers and profits. Psychological impacts include anxiety, guilt, and frustration. Cyber-attacks can damage public perception, damage relationships with customers, and loss of accreditations. Therefore, the Department of Homeland Security plays an important role in countering threats to cyber networks. The National Cybersecurity and Communications Integration Center’s (NCCIC) mission is to reduce the risk of systemic cybersecurity and communications challenges in our role as the Nation’s flagship cyber defense, incident response, and operational integration center. Since 2009, the NCCIC has served as a national hub for cyber and communications information, technical expertise, and operational integration including situational awareness, analysis, and incident response center. Quandary 2 Safety and security issues concern both transportation modes and terminals that can be either a target for terrorism, a vector to conduct illegal activities, or even a form of warfare. Also, transportation systems are attractive targets to terrorists because their networked character makes them highly vulnerable and because their fundamental position in the economy can result in widespread losses. “Terrorists adapt their methods and targets to our security efforts, a phenomenon known as ‘‘threat shifting’’. The ability of terrorists to adapt and to conceal their capabilities and intentions means it is impossible to know with any certainty the number of active and viable plots that may be underway” (Cox, 2011). The most visible emerging form of security threats is cybersecurity, to which transportation infrastructures and organizations are
particularly vulnerable. The growth in information technologies and their associated networks has opened new forms of vulnerability as control and management systems can be remotely accessed. Airplane Threats: hijacking, cyberattacking, and biological Structural mitigation: video surveillance Non-structural mitigation: passenger screening Train Threats: terrorism attack, cyberattacking and biological Structural mitigation: video surveillance Non-structural mitigation: passenger screening Bus Threats: bombing attack, terrorism attack, and biological Structural mitigation: video surveillance Non-structural mitigation: passenger screening According to Christian viewpoints, government have responsibility to protect human life following the God’s words. God loves and saves human life. “But the Lord is faithful. He will establish you and guard you against the evil one” – 2 Thessalonians 3:3. Also, the action of government should reflect to God’s verbal that citizens can trust in them. “If any of you lacks wisdom, let him ask God, who gives generously to all without reproach, and it will be given him” – James 1:5. God make His plan to rescue human from evil. “The Lord will rescue me from every evil deed and bring me safely into his heavenly kingdom. To him be the glory forever and ever. Amen” – 2 Timothy 4:18. Therefore all actions of government should reflect the Bible to make America safety due to terrorism attacks and cyberattacks increasing. “But let all who take refuge in you rejoice; let them ever sing for joy, and spread your protection over them, that those who love your name may exult in you” – Psalm 5:11. Reference Bayuk, J. L. (2012). Cyber attacks. Computers & Security , 31 (2), 251. Cox, A., Prager, F., & Rose, A. (2011). Transportation Security and the role of Resilience: A Foundation for Operational Metrics. Transport Policy , 18 (2), 307–317. Holy bible . (2011). Zondervan. Kilroy, J. R. J. (2018). Chapter 8. Threats to homeland security: Reassessing the all-hazards perspective . Wiley. Ramsay, J. D., & Kiltz, L. A. (2018). Chapter 5-6. In Critical issues in homeland security: A casebook . Routledge. Hello Sara, Thank you for your post about cybersecurity. I totally agree with you that cyberthreats continue to grow and evolve in frequency, vector, and complexity since technology explores globally.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help