Cyber Attack Risk Analysis

Improved Essays
As technology evolves, so will the methods that criminals and terrorists utilize to achieve a personal gain. In the United States and throughout the most countries, technology plays a significant role in the way our economy operates, how cities obtain power, and how information is shared. If technology was used to disrupt this state of living, this could lead to a detrimental chain of events that could cripple the very existence of how we live. The technology we rely upon has numerous strengths, but there are also weaknesses that come along with it. The biggest threat to technology is the growing concern of a potential cyber attack that would disrupt critical infrastructures.
When managing an emergency such as a cyber attack, planners must first assess the risks associated with a cyber attack, analyze the risk of a cyber attack, develop strategies to mitigate that risk, evaluate strategies, and implement and monitor current plans. This process expresses the five characteristics of effective risk assessment planning. Society relies upon many forms of
…show more content…
However, the expense for maintaining and increasing cyber security and cyber security awareness has cost the federal government approximately $459 million since 2012 (Department of Homeland Security, 2011). This figure could eventually increase as newer technology is released and developed, but it is evident how serious cyber security must be taken to ensure the safeguard of information and the proper mitigation of a cyber attack. The monitoring of cyber attacks, as previously mentioned, involves many entities working collaboratively to stonewall cyber attacks from occurring. When implementing measures, agencies have to recognize a legitimate threat exists and if the threat is imminent in order to stop the

Related Documents

  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Week two of our material provided us with several different elements of the homeland security assessment process. What I gathered most from the material was based on the “Baldrige Assessment Criteria and the eight step process for a successful assessment” (Fisher, 2004). However, the consensus is that the key elements in the homeland security assessment process are “a threat assessment, a vulnerability assessment and a criticality assessment” (Decker, 2001). In my opinion, these three key elements are equally critical components of any emergency management plan and/or emergency management service. Virtually every day we hear of heightened degrees of already proposed threats or new means of threats to our nation, as well as the criticality of them.…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The most serious threat to the United States of America is not a physical terrorist attack, but rather a cyber-related one. In Washington, D.C., you can probably count on one hand the issues that both Republicans and Democrats can agree on – and this is certainly one of them. The inevitability of such a catastrophic event and the destruction that it could cause is a nightmarish scenario that without a doubt keeps our elected officials and military leaders awake at night. The questions aren’t “if,” but “when?” Imagine life for one day, or even one hour without computers or the internet.…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    What exactly is cybersecurity? Cybersecurity, also referred to as Information Technology Security, centers on guarding networks, computer systems, and critical data from unauthorized access, alteration or damage by hackers or perhaps even disgruntled employees. Thorough cyber breaches transpire all too often in today’s corporate world. Attackers or also known as “hackers” simply evade conventional security implementations to steal essential data and to disrupt company operations. “Price Waterhouse Coopers (PWC) recent report – the Global State of Information Security Survey: 2015 – shows that, last year, organizations have reported financial hits up to 93% more costly than 2013” (Zaharia, 2015).…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The fact is that an attack on computer technology can cause a great deal of damage. First, however, we must define cyber terrorism. I define cyber terrorism as abuse of computer technology to destroy personal and business information with the intent to harass. That being…

    • 330 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    These assessments are created to help companies be proactive and help prevent threats. As the consultant, I will conduct the assessment and determines how probable it is that a specific risk may happen. A formal report will be given to explain the consequences of each risk present. The risks will also be rated based on the likelihood of the event and the severity of it. This will…

    • 709 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Introduction As more preponderant challenges emerge in today’s society related to governmental security breaches and public mass shootings, higher education institutions are placing more accentuation than ever upon risk mitigation. Within the IT department at Southside Virginia Community College, risk management is the process of identifying, analyzing and responding to factors focusing on human characteristics behaviour and its impacts on information security ultimately associated with risks. To be prosperous, advanced risk management must be a process that is thoroughly embedded into the agency’s strategic plan focusing on comportments such as overall governance, physical risk, cyber risk, and data security involving all personnel to protect sensitive information, students, personnel, and the general public. Information Security Specialists was a silo a decade ago. Now it’s more an area of the business that has a voice in every aspects of the organization.…

    • 1568 Words
    • 6 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Great Essays

    For an organization to successfully enforce its security program, it must take risk analysis and risk management into consideration. A risk analysis will identify potential threats and vulnerabilities of the systems and any existing related risks. Applying threat modeling to analyze the security of an application by identifying, quantifying, rating, and addressing the threats is crucial for the organization to prevent and mitigate any threats. Since risk is calculated by multiplying the threat by the vulnerability, the higher the threat, the higher the risk an organization may have to suffer. If the threat is zero, the risk is zero.…

    • 1541 Words
    • 7 Pages
    Great Essays