Vulnerabilities Of Coast Guard

Superior Essays
(U) There are many vulnerabilities in the cyber realm, and they continue to increase every time a new system is added to the fleet. The main goal of Coast Guard cyber intelligence is staying ahead of the hackers. To do this, Coast Guard intelligence needs to understand who will attack them in the future and how they will do it. They need to know everything that was just discussed above, including the type of person, capability, vulnerability, and threat level to the United States government and the Coast Guard. If one or all of these are not known, cyber defenders cannot prepare for an attack. This is why cyber intelligence is so important to the Coast Guard and the government alike. Moreover, reliance on cyber systems within the Coast Guard …show more content…
When systems are shut down and tampered with by outside actors, they become inoperable, and the Coast Guard cannot carry out its mission. For example, if the navigation system of an HH-60J Jayhawk was hacked, and the GPS portrayed a completely different location, or the automated warning system in the aircraft delivered false reports that the helicopter would crash, the helicopter would become inoperable. If there was a current search and rescue case, the aircraft would not be able to save the party in question, and possibly, people would die. Looking at the greater picture, Sergio Galindo, general manager of GFI Software, commented that the many consequences of a cyber-attack are disastrous for the government and the corporations of America alike. “Usernames, passwords, credit card data, health records – malicious use of this data by criminals can quickly create financial hardship and significant stress for affected individuals, while the negative fallout for organizations the data was stolen from can range from loss of reputation to fines, falling sales, civil and criminal legal proceedings and more.” The consequences of cyber-attacks are large, therefore they must be a high priority to insure this does not

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Becoming a certified boat coxswain is the goal and responsibility of all third class boatswains’ mates. I would like the Coast Guard to establish a cohesive plan to train, and fund education to generate qualified BM3 coxswains in the U.S. Coast Guard Reserve. Once they graduate A-school there is no solid plan or funding to ensure the reserve member’s training stays on schedule and completes their training within the required time frame. The process for a Reserve BM3 to become a coxswain is a long and difficult journey.…

    • 778 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government. The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ef 21 Research Papers

    • 965 Words
    • 4 Pages

    Fires 5. Command and Control / NET Centric 6. Cyberspace and the Electromagnetic Spectrum 7. Force Protection 8. Intelligence 9.…

    • 965 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Safety Harbor is a city on the west shore of Tampa Bay in Pinellas County, Florida, The name Safety Harbor originated from the early 18th century, when pirates were a substantial influence in the area. The area offers a wide array of shopping, dining and entertainment options for tourists and residents…

    • 52 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Some positions within the Coast Guard should be evaluated closely to determine if these positions are beneficial to the Coast Guard Mission. My position in the Response Division, at Sector Buffalo, I feel should be eliminated because it is of no value to the Coast Guard. This position does not have a mission, there are no leadership opportunities, and is an ineffective use of Coast Guard resources. Every member of the Coast Guard should want to, and should be expected to, contribute in some way to one of the many Coast Guard missions. One of the main reasons that this position should be eliminated is because it is a Chief Petty Officer (CPO) position that does not offer any leadership opportunities.…

    • 554 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Hurricane Response Paper

    • 534 Words
    • 3 Pages

    Being in the Coast Guard at a Maritime Safety and Security Teams (MSST) we provide rapidly deployable specialized waterborne and shore side antiterrorism forces for critical maritime infrastructure and strategic maritime shipping throughout the ports of the United States and ports of interest abroad. The current utilization of MSSTs represents an unbalanced equation of risk versus mission accomplishment. We are reserved to function as a contingency response asset for significant national or regional maritime. We routinely conduct full-scale training and exercises on a host of terrorist response scenarios, which allows us to react with a degree of familiarity in the event of terrorist…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Coastal Vulnerability

    • 633 Words
    • 3 Pages

    A number of stakeholders is considered to be affected by the Cockburn Sound Coastal Vulnerability & Flexible Adaptation Pathways Project. First, the four local government which are City of Rockingham, Town of Kwinana, City of Freemantle and City of Cockburn. The four local jurisdictions are considered to get the direct impacts of the climate change associated to the potential risks and hazards caused by coastal erosion and inundation. They are also responsible for the extensive coastal infrastructure development such as coastal roads, heritage buildings and other public facilities. Second, the Royal Australian Navy on Garden Island who has the interest to manage their assets along the coastal area.…

    • 633 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Aquatic Defense The United States has a few branches of the military. They all have important jobs that make them unique, but they also all have similarities. Two branches that are often debated are the Navy and the Coast Guard. The United States Navy and the United States Coast Guard have been said to be the same branches by some, and completely different by others.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment? Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays

Related Topics