logo

Law Enforcement - Cyber Security | Paper

   

Added on  2022-08-24

12 Pages2145 Words20 Views
Running head: CST 610 9043 Cyberspace and Cyber security Foundation
CST 610 9043 Cyberspace and Cyber security Foundation
Name of the Student
Name of the University
Author Note
Law Enforcement - Cyber Security | Paper_1
CST 610 9043 Cyberspace and Cyber security Foundation 1
Table of Contents
Introduction:...............................................................................................................................3
Law enforcement:.......................................................................................................................3
Cyber security:.......................................................................................................................3
DHS Law enforcement resources:.........................................................................................4
The Homeland Security Information Network (HSIN):....................................................4
Project iGaurdian:..............................................................................................................4
Stop. Think. Connect. ™ Campaign:.................................................................................4
Cyber awareness coalition:................................................................................................5
Available resources:...............................................................................................................5
U.S. Secret Service Electronic crimes Task forces:...........................................................5
National cyber Security alliance (NCSA):.........................................................................5
The Intelligence Community:....................................................................................................5
Life cycle of a cyber threat:...................................................................................................5
Threat response and recovery:...............................................................................................6
Prediction Model for Managing Cyber Security Threats:......................................................7
Contingency planning for the disaster recovery:...................................................................7
Homeland security:....................................................................................................................8
Risk mitigation:..........................................................................................................................8
Risk assessment:.......................................................................................................................10
Law Enforcement - Cyber Security | Paper_2
CST 610 9043 Cyberspace and Cyber security Foundation 2
Conclusion:..............................................................................................................................10
References:...............................................................................................................................11
Law Enforcement - Cyber Security | Paper_3
CST 610 9043 Cyberspace and Cyber security Foundation 3
Introduction:
The purpose of this paper is to provide a description of the impact which the threats
would have on the sector of law enforcement. The statements of the impact can include the
loss of data integrity, loss of control systems, and loss of confidentiality or exfiltration of
data. The report will also provide impact assessments as the result of the security related
incidents to the sector of law enforcement (Liu & Wang, 2019). This report is related to the
SAR report as the network security, penetration testing etc. are provided in the SAR report.
The law enforcement community, the defense and civilian community, the private sector will
be discussed in this report. The main aim of this AAR is to share the methodology of system
life cycle, critical thinking and rationale that can be used for resolving the cyber incidents.
Law enforcement:
Cyber security:
The cyber attacks on the organisations can be having wide ranging or instant
consequences that is for the economic interest related to the security. The cyber security
includes policies for recording and finding a possible breach and policies that is needed to
make response to the events. An enacted and well written network security effort will make
response to the variety of threats (Acemoglu, Malekian & Ozdaglar, 2016). The threats can
include malicious codes, direct attacks and internal threats. The network security is the
combination of multiple defence layers at the edge as well as in the network (Liu & Wang,
2019). The internet is basically a universal connector where the third party services that are
unprotected, are able to open the door that is used for the cyber attackers for accessing the
data. Therefore, the security to network should be given priority, the time when a device is
connected.
Law Enforcement - Cyber Security | Paper_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

Mission-Critical Components of a LAN | Study
|19
|3346
|30