.

Friday, March 29, 2019

Psychological Aspects of Cybersecurity

Psychological Aspects of Cyber trade protectionHuman Factors, brats, horticulture and Liability Psychological Aspects of Cyber pledgeIntroductionIn to twenty-four hourss society, cyber onslaught and onsets is becoming more prevalent. No one really knows the motivation potty much(prenominal) outpourings. In some disciplines, it may be psychological and in others it could be a way to attain an adrenaline rush by invading a high-level security system. While cyber attacks has increased, our community is displace execution actions in place to safeguard our overcritical infrastructure.With all of that being said, coitus has a responsibility to the people/nation to protect and see to it their freedom. Cyber attacks argon malicious acts that target study systems, infrastructures, and calculating machine networks. Normally, the sources of the attack are unknown and the reasons of the attack are unclear. In many cases, the attacks are designate as cyber warfare or cyber terro rism. In the same fashion, the people who fetch these crimes are described as communist, cyber terrorist, and black hat etc. However, when Congress is the focus of the attack normally the target of attack is our infrastructure.Descriptive Labels employ to CybercrimeThe descriptive label that would be applied to cybercrime is data security good luck or cyber terrorism. Further explanation of info gage Breach bill Act 2012, mandates that companies present one across reasonable security measures to protect personal discipline and establish a uniform breach notification law (S. 3333 (112th) data Security and Breach Notification Act of 2012, 2012). Cyber terrorism is when a electronic computer is used as the weapon for attack. In some cases you will mustinesser that cyber terrorism is the way to seek revenge or used as a method to intimidate or coerce one. An example of a cyber-terrorism perhaps could be hacking into aircrafts system and changing the coordinates of the ru sh.In 1996, chairperson Bill Clinton created a Commission of Critical Infrastructure Protection. Congress rising that the nation was at risk of cyber attacks. Therefore, to heighten awareness and maintain frugal stability the board felt it was necessary to protect critical infrastructure. This was a mixture of electricity, computer networks, communication etc. because all of these elements were vulnerable of cyber-warfare. With this in mind, the bafflement was also thinking of protecting the humankind and mysterious industries from such attacks. They were completely oblivious of the dangers how much or daily lives rely on computers. Not deeming the dangers and vulnerabilities they subjects themselves to when using the computer. Another issue is finding out who are the perpetrators and how the attack were initiated. The board felt it would be close to helpful if they adequately protected critical system from intrusion. That meant ensuring the proper firewalls were enabled a nd the system was being monitored (http//csciwww.etsu.edu/gotterbarn/stdntppr/).Threat FactorsIn reality, if the coupled States Infrastructure comes under attack the enemy could stultify our defenses depending on how sophisticated the attacker is. The possible intent behind struggle our infrastructure, would be to target our water supply, transportation, telecommunication, energy, and last but not least(prenominal) finance. Our way of living depends on critical infrastructure if we were to lose these behavior-sustaining roles we would be vulnerable to the enemy. These operations are outstanding and we have stick dependent on these networks. The lost of electricity, telecommunications, transportation, energy, and water would render us helpless. such an attack would disrupt our day-to-day life and cause mass solicitude and fear. Therefore, in show to stop such an act from occurring, Congress has created a new executive branch to merge 22 government agencies that were alrea dy in existence. The goal was to secure the nation and preserve freedom. In addition, have the ability to fence off attacks and be prepared for unexpected disasters. To come upon this task, the segment of Homeland Security had to unify the department in order to strengthen the components. Policy tells us that with partnership with other departments and operators of critical infrastructure would improve cyber security sharing information, which is ideal for the nation.Water yieldAttacking the water supply would be the most critical attack on the infrastructure. The water supply is controlled by computer systems, which is why it poses the most security risk. If the enemy was able to bypass the security features, they could release s intimatelyed amounts of water in any particular area. Destruction of large dams could let go of large amounts of water resulting in catastrophic flooding, loss of life and deadening to property.Another vulnerability would be the sewer system. The se wage system protects public health and the environment while providing a series of treatment that orderly the water supply. Raw sewage has harmful bacteria and viruses that could be life threatening to human or animas if exposed to it.Bioterrorism or chemical substance attacks could deliver wide administer contamination with small amounts of microbiological agents or toxic chemicals could bushwhack public health (Terrorism and Security Issues Facing the Water Infrastructure Sector, 2006 ). (http//fpc.state.gov/documents/ cheek/68790.pdf). energyThe second most eventful infrastructure that could be attacked is energy. Energy is described in two separate classifications one being electricity and the other being natural gas. Electricity is used in everywhere i.e. houses, cities and regions. It is needed for day-to-day living such usage of machines and life scrimping mechanisms. For example, cyber terrorist has the ability to gain access to daily power insure data. The report show s the flow of electricity in different regions.As a result, a cyber terrorist would have the ability to know what the busiest sections of the football field were. It is important to realize with this information they could shut down the power gird at the busiest time of the day and cause hysteria, backflow, and confusion. Without power the United States, defenses are down. There have been incidents or credible intelligence to indicate that a potentially well organized, dissipated cyber attack is imminent against the electrical utility industry in general or BPA specifically, or Terrorist activity, either physical or cyber, has been perpetrated against civilian or government sites indoors the boundaries of the United States (Threat Conditions, n.d.). http//info.bpa.gov/Emergency/ThreatConditions.aspxNot only is electricity important to infrastructure but natural gas is too. Cyber terrorist can obturate the use or redirect gas flows. Keeping the energy a float is important for mai ntaining the safety and economic success in the United States. The White House Initiative has an Executive order, which is led by the Department of Energy and the Department of Homeland Security. Their job is to ensure electric companies and grid operators have working knowledge of cyber security potentials and prioritize their actions and investments to improve cyber security. In addition their industry stakeholders in the energy sector, are also add to the development of the Cyber security Framework, which was announced as part of Executive parade 13636 on Improving Critical Infrastructure Cybersecurity. (http//energy.gov/ holds/energy-department-announces-new-investments-over-30-million-better-protect-nation-s).TransportationA care in the transportation system would cause a chain of economic disruption. By interfering with transportation it hinder citizens and would progressively degrade the economy over time span. It would impede on scheduling as well as accessibility. In lik e manner, these methods would have a negative encounter on cargo being transported from place to place. Moreover, cyber terrorist can target stun operations by taking controls of the switches, additional they could take over flight software to divert aircraft. Sapphire or Slammer worm spread quickly through the Internet attacking millions of computers and overwhelming them with data cod to a flaw in a Microsoft program. (CONSUMER PRIVACY DEVELOPMENTS, n.d.).Transportation is important to critical infrastructure. In order to maintain a since of balance, proactive measures must be in place to strengthen and secure critical infrastructure. It is important to have the necessary assets including but not limited to networks and public confidence. costless to say, the infrastructure must be secure in order to withstand and promptly recoup from an attack.FinanceTelecommunicationCompany LiabilitiesReducing vulnerabilities through effective internal cybersecurity policy controlsConclusion The threat of cyber crime has arise in the United States. Congress is having more debates on the nations s cyber security, terrorism, and breaches within our national systems. It was said by the ******* that we were in trouble because cyber attacks have resulted in the greatest transfer of wealth in history. (*****). Although, Legislation have been proposed to govern the laws the bills have not been enacted. This is mainly due to the fact the government and private industries have issues with the federal data security bills. Currently, the United States has a cyber security Executive Order in place.The purpose for this order, is to protect their United States from cyber bruise and the attacks against the nations critical infrastructure. A threat to the infrastructure is major to national security. Our nation relies on the infrastructure to keep the mainframe secure and efficient against intrusion. As stated earlier, cyber attacks are becoming more vigilant therefore, the governmen t had to make changes to the executive branch. In 2002, a new executive department was put into place called the Homeland Security Act. Homeland Security Act 2002, was created to prevent terrorist attacks within the United States reduce the vulnerability of the United States to terrorism and minimise the damage, and assist in the recovery, from terrorist attacks that do occur within the United States. (Homeland Security Act of 2002)ReferencesAnonymous. (2011). Data breach and electronic crime the Sonys case. Retrieved from gcsec.org http//www.gcsec.org/blog/data-breach-and-electronic-crime-sonys-caseAnonymous. (2013). Managing CyberSecurity Risk. Retrieved from Protiviti http//www.protiviti.com/en-US/Documents/Newsletters/Board-Perspectives/Board-Perspectives-Risk-Oversight-Issue44-Managing-Cybersecurity-Risk-Protiviti.pdfAnonymous. (n.d). close Sony Electronics Life at Sony. Retrieved from http//discover.store.sony.com/ http//discover.store.sony.com/sonyjobs/pages/about/life.ht mlAnonymous. (n.d). Corporate Mission. Retrieved from neimanmarcus http//www.neimanmarcuscareers.com/story/mission.shtmlAnonymous. (n.d). Mission Values. Retrieved from astir(predicate) Target https//corporate.target.com/about/mission-valuesAnonymous. (n.d). Throught the social classs. Retrieved from Target.com https//corporate.target.com/about/historyAspan, M. (2011). Citi says 360,000 accounts hacked in May cyber attack. Retrieved November 23, 2011, from http//www.reuters.com/article/2011/06/16/us-citigroup-hacking-idUSTRE75F17620110616Bavisi, S. (2009). Penetration Testing. In Vacca, J. R. (Ed.), information processing system and information security handbook. Boston, MA Morgan Kaufmann Publishers.Bodhani, A. (2013). BadIn a Good Way. Engineering Technology, 7(12), p64-68.Campbell, Q., Kennedy, D.M. (2009). The psychology of computer criminals. In Bosworth, et al., (Eds.), computer security handbook. New York, NY John Wiley Sons.Chen, C. Shaw, R. Yang, S. (2006). Mitigati ng information security risks by increasing user security awareness A case study of an information security awareness system. Information Technology, Learning transaction Journal, 24(1), p1-14.Chen, T. Walsh, P. (2009). Guarding Against Network Intrusions. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA Morgan Kaufmann Publishers.DATALOSSdb make Security Foundation (2014). Data Loss Statistics. Retrieved from http//datalossdb.org/statisticsDittrich, D., Himma, K.E. (2006). Hackers, crackers and computer criminals. In H. Bidgoli (Ed.), Handbook of information security (Vol 2). New York, NY John Wiley Sons.Elgin, B., Lawrence, D., Riley , M. (2014, February 21). Neiman Marcus Hackers Set shoot 60,000 Alerts While Bagging Credit Card Data. Retrieved from tradingweek.com http//www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-dataEthical Issues. (2013). Retrieved from http//cps182cyber-crim e.wordpress.com/ethical-issues/Finklea, K.M., Theohary, C.A. (2012). Cyber-crime Conceptual issues for sex act and U.S. law enforcement. Journal of Current Issues in Crime, Law and Law Enforcement. 5 (1/2), 1-27. Retrieved from http//web.a.ebscohost.com.ezproxy.umuc.edu/ehost/detail?vid=3sid=79df209d-d6a2-4fd7-9761-f40b899a23e1%40sessionmgr4002hid=4209bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRldb=i3hAN=88850916Frizell, S. (2014, January 29). Holder Feds Investigating Target Breach. Retrieved from Time.com http//business.time.com/2014/01/29/feds-investigation-target-security/Germano, S. (2013, declination 27). Targets Data-Breach Timeline. Retrieved from Wall Street Journal http//blogs.wsj.com/corporate-intelligence/2013/12/27/targets-data-breach-timeline/Goldman, G. (2011). Mass e-mail breach Just how bad is it? Retrieved November 23, 2011, from http//money.cnn.com/2011/04/06/technology/epsilon_breach/index.htmHarris, E. A., Perlroth, N., Popper, N. (2014, January 23). Neiman Marc us Data Breach Worse Than First Said. Retrieved from New YOrk Times http//www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.htmlHassan, A.B., Lass, F.D., Makinde, J. (2012). Cyber-crime in Nigeria Causes, effects and the way out. ARPN Journal of Science and Technology. 2(7), 626-631. Retrieved from http//www.ejournalofscience.org/archive/vol2no7/vol2no7_11.pdfHeavey, S., Finkle, J. (2014, bump into 13). Target says it declined to act on early alert of cyber breach. Retrieved from Reuters. Com http//www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313ITU. (2012). spirit cyber-crime Phenomena, challenges and legal response. Retrieved from www.itu.int/ITU-D//cybersecurity//Cyber-crime%20legislation%20EV6. pdfKaiser, D. (2007). Insurance options vary as much as cyber attacks. Business Insurance, 41(21), 24.Katz, K. (2014, February 21). Security info. Retrieved from www.neimanmarcus.com http//www.neimanmarcus.com/NM/Security-Info/ cat49570732/c.cat?icid=topPromo_hmpg_ticker_SecurityInfo_0114Krebs, B. (2014, 02 14). Target Hackers Broke in Via HVAC Company. Retrieved from krebsonsecurity.com http//krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/Lewis, J. (2013). tiptop the Bar for Cybersecurity. Center for Strategic International Studies. Retrieved from http//csis.org/files/publication/130212_Lewis_RaisingBarCybersecurity.pdfMansoor, B. (2009). Intranet Security. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA Morgan Kaufmann Publishers.McAfee (2014). McAfee Labs Threats Report Fourth Quarter 2013. McAfee Labs. Retrieved from http//www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdfMetz, C. (2005). identity theft is out of control. (cover story). PC Magazine, 24(14), 87Sales, N. (2013). REGULATING CYBER-SECURITY. north University Law Review, 107(4), 1503-1568.Shackleford, D. (2013). New Pathways to Network Security. Information Security, 15( 6), p10-15.Sherr, I., Wingfield, N. (2012, May 7). Play by Play Sonys Struggles on Breach. Retrieved from Wall Street Journal http//online.wsj.com/news/articles/SB10001424052748704810504576307322759299038Warner, J. (2011). Understanding cyber-crime in Ghana A view from below. International Journal of Cyber Criminology. 5(1), 736-749. Retrieved from http//www.cyber-crimejournal.com/warner2011ijcc.pdfWaugh, D. (2001). Computer crime and ethics. Retrieved from http//homepage.ntlworld.com/woofy/ethics/ethics.pdfWilliams, M. (2011, May 01). PlayStation Network Hack Timeline. Retrieved from pcworld.com http//www.pcworld.com/article/226802/playstation_network_hack_timeline.htmlWolf, J., Maclean, W. (2011). IMF cyber attack aimed to steal insider information Expert. Retrieved November 23, 2011, from http//www.reuters.com/article/2011/06/12/us-imf-cyberattack-idUSTRE75A20720110612Youderian, A. (2013, August 08). LulzSec Hacker Gets Year in Prison for Sony Attack. Retrieved from courthouse news.com http//www.courthousenews.com/2013/08/08/60130.htm

No comments:

Post a Comment