discussion 6
.docx
keyboard_arrow_up
School
Liberty University *
*We aren’t endorsed by this school
Course
HLSC 530
Subject
Information Systems
Date
May 11, 2024
Type
docx
Pages
4
Uploaded by son123456 on coursehero.com
Quandary 1 –
Kilroy: Chapter 8
and
Ramsay, Kiltz: Chapter 5.2
After having read the assigned chapter and your own research what are the potential consequences we face from cyber intrusions or attacks? What are our defenses against such attacks?
Quandary 2 –
Ramsay, Kiltz: Chapter 6
After having read the assigned chapters and your own research what threats or hazards does our transportation system face or pose? List at list 3 specific modes of transportation and the specific threats each one faces. Provide at least 2 mitigation strategies for each mode and threat faced – 1 structural and 1 non-structural in nature. Does the Bible offer guidance about withstanding the storms we face in life if so what does it say?
Quandary 1
Cybersecurity is now a global priority as cybercrime and digital threats grow in frequency and complexity. Cybercrime is any criminal activity committed using computers or network providers (Kilroy, 2018). Also, these threats can take various insidious forms and can very quickly compromise the security and privacy of individuals, businesses, and government agencies such as credit card fraud, identity theft, and illegal money transfers. Moreover, cyber criminals are very sophisticated and can cause great damage in terms of homeland security. In order to assess the abilities of federal, state, and local government agencies to respond to a cyber-
attack, the Department of Homeland Security’s Cyber Security Division created an exercise called Cyber Storm (Kilroy, 2018). Adverse effects of cyber-attacks on the United States include digital, economic, psychological, reputational, and social. Physical impacts include loss of life, bodily injury, and identity theft. Economic impacts include investigative costs, compensation payments, extortion payments, and reduced customers and profits. Psychological impacts include
anxiety, guilt, and frustration. Cyber-attacks can damage public perception, damage relationships
with customers, and loss of accreditations. Therefore, the Department of Homeland Security plays an important role in countering threats to cyber networks. The National Cybersecurity and Communications Integration Center’s (NCCIC) mission is to reduce the risk of systemic cybersecurity and communications challenges in our role as the Nation’s flagship cyber defense, incident response, and operational integration center. Since 2009, the NCCIC has served as a national hub for cyber and communications information, technical expertise, and operational integration including situational awareness, analysis, and incident response center.
Quandary 2
Safety and security issues concern both transportation modes and terminals that can be either a target for terrorism, a vector to conduct illegal activities, or even a form of warfare. Also, transportation systems are attractive targets to terrorists because their networked character makes
them highly vulnerable and because their fundamental position in the economy can result in widespread losses. “Terrorists adapt their methods and targets to our security efforts, a phenomenon known as ‘‘threat shifting’’. The ability of terrorists to adapt and to conceal their capabilities and intentions means it is impossible to know with any certainty the number of active and viable plots that may be underway” (Cox, 2011). The most visible emerging form of security threats is cybersecurity, to which transportation infrastructures and organizations are
particularly vulnerable. The growth in information technologies and their associated networks has opened new forms of vulnerability as control and management systems can be remotely accessed.
Airplane
Threats: hijacking, cyberattacking, and biological
Structural mitigation: video surveillance
Non-structural mitigation: passenger screening
Train
Threats: terrorism attack, cyberattacking and biological
Structural mitigation: video surveillance
Non-structural mitigation: passenger screening
Bus
Threats: bombing attack, terrorism attack, and biological
Structural mitigation: video surveillance
Non-structural mitigation: passenger screening
According to Christian viewpoints, government have responsibility to protect human life following the God’s words. God loves and saves human life. “But the Lord is faithful. He will establish you and guard you against the evil one” – 2 Thessalonians 3:3. Also, the action of government should reflect to God’s verbal that citizens can trust in them. “If any of you lacks wisdom, let him ask God, who gives generously to all without reproach, and it will be given him” – James 1:5. God make His plan to rescue human from evil. “The Lord will rescue me from
every evil deed and bring me safely into his heavenly kingdom. To him be the glory forever and ever. Amen” – 2 Timothy 4:18. Therefore all actions of government should reflect the Bible to make America safety due to terrorism attacks and cyberattacks increasing. “But let all who take refuge in you rejoice; let them ever sing for joy, and spread your protection over them, that those who love your name may exult in you” – Psalm 5:11.
Reference
Bayuk, J. L. (2012). Cyber attacks. Computers & Security
, 31
(2), 251. Cox, A., Prager, F., & Rose, A. (2011). Transportation Security and the role of Resilience: A Foundation for Operational Metrics. Transport Policy
, 18
(2), 307–317.
Holy bible
. (2011). Zondervan. Kilroy, J. R. J. (2018). Chapter 8. Threats to homeland security: Reassessing the all-hazards perspective
. Wiley.
Ramsay, J. D., & Kiltz, L. A. (2018). Chapter 5-6. In Critical issues in homeland security: A casebook
. Routledge. Hello Sara,
Thank you for your post about cybersecurity. I totally agree with you that cyberthreats continue to grow and evolve in frequency, vector, and complexity since technology explores globally.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help