logo

Cyber Security and Emergency Management: Strategies and Frameworks

   

Added on  2023-06-11

8 Pages1963 Words223 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Authors note

1CYBER SECURITY
Part 1
Cyber security and Global Interdependence
According to Clemente, (2013), the cyber security is a term that helps is coined
several times in today’s scenario and it is connected with the daily activities. The term critical
related with cyber security in today’s society varies and its definition has expanded through
the years. The definition of critical is redefined by global interdependencies as different
regions and countries are adopting their own definition of critical for cyber security. Hence,
risk management is important to manage the cyber security up to an extent which is critical.
The case studies are provided to understand the critical infrastructure of cyber security and it
shows that there are potential vulnerabilities arising globally that needs to be operated. The
recommendations provided for the cyber security infrastructure are adaptation, prioritization,
incentivize and invest in resilience.
EINSTEIN 3 to Critical Infrastructure and its problems
According to Bellovin et al., (2011), the EINSTEIN 3 is a program for detection and
prevention of cyber intrusions which is not effective for practical consideration in cyber
security. The EINSTEIN was introduced by Federal Government of United States for
protection of cyber security that has now become ineffective in managing the infrastructure
networks. Hence, there is a need for extending and improving EINSTEIN 3 to effectively
manage the infrastructure networks. The article provides that there are three major methods
that needs to be improved in EINSTEIN 3 to better the performance of infrastructure
network. They are physical security, separation of content and control and transmission
security. Hence the improvement will help to maintain the threats that are unknown and
undefined till now.

2CYBER SECURITY
Cyber Infrastructure Protection
According to Saadawi & Jordan, (2011), the protection of cyber infrastructure is
important and the article briefly describes the cyber security and its components. The cyber
infrastructure protection is discussed in the article that shows three main parts in the article.
They are address policy, cybercrime and cyber security strategies, smart cities and their cyber
securities, cyber security for infrastructure, technical faults and issues. The Cyber
Infrastructure Protection (CIP) is described to strengthen the policies and strategies related to
cyber space. Hence, the article shows that Cyber Infrastructure Protection is important to
maintain the cyber security at a global level.
National Protection Framework
According to Homeland Security, (2016), the National Protection Framework is the
ultimate guide for safeguarding from terrorism and threats. The framework is important to
maintain the safety, security and integrity of the community from known and unknown
hazards. This helps at global level to manage and maintain the risks related to natural
disasters, terrorism and hazards. Thus this will help to manage the various activities and will
have major impact on the community on a large scale. The major factors of National
Protection Framework are prevention, protection, mitigation, response and recovery. Thus,
the article shows that these factors should be worked upon to maintain the safety of the
community.
They all have one thing common and that is they all are discussing about safety and
protection. The term protection is the main concept in the above four articles. All the articles
discusses cyber security and their protection with emphasis on how to better the performance
of cyber space. The differences in the assessment of critical infrastructure protection and
cyber security are that the first article is talking about global interdependence of cyber
security (Clemente, 2013). The second article is discussing about EINSTEIN 3 extension to

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Evaluating Cyber Infrastructure: Insights on Security, Arguments, and Themes from Various Authors
|8
|2044
|340

Domestic Infrastructure Protection Plan and Functions
|6
|1227
|249

Homeland Security Strategy Assignment 2022
|6
|941
|31

Article Review and Case Study Synthesis
|12
|2955
|6

Introduction to Cyber Crime Week 5
|6
|843
|323

Contemporary issues in information technology Assignment 2022
|11
|3434
|56