HSM 497 - Cybersecurity, Science, and the Role of Homeland Security

Verified

Added on  2023/04/23

|5
|529
|266
Discussion Board Post
AI Summary
This discussion post focuses on the increasing frequency of cyber-attacks targeting various sectors in the United States, including corporations, government entities, and critical infrastructure. It highlights the roles of both state-sponsored actors and criminal organizations in these attacks, all of which fall under the Department of Homeland Security's purview. The post identifies different categories of cyber-attacks such as eavesdropping, XSS, password attacks, SQL injection, drive-by, man-in-the-middle, DoS, and phishing attacks. It further explores the role of current science and technology in both enabling cybercrimes and assisting organizations in combating them. The effectiveness of the Department of Homeland Security in managing national cybersecurity risks and the tools, tactics, and techniques available to the organization are also discussed. The post concludes by emphasizing the importance of the Department's role in defending and securing the nation's cyberspace.
Document Page
Running head: CYBERSECURITY
Cybersecurity
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2CYBERSECURITY
Table of Contents
Table of Contents.............................................................................................................................2
Introduction......................................................................................................................................3
Types of cyber attack.......................................................................................................................3
Current science and technology.......................................................................................................3
Effectiveness of Department of Homeland Security.......................................................................4
Tools, tactics, and techniques made available by Department of Homeland Security....................4
Conclusion.......................................................................................................................................4
Reference.........................................................................................................................................5
Document Page
3CYBERSECURITY
Introduction
The prime determination of the paper is focus on the different types of cyber-attack and the
current science and technology involved with cyber-attack. The effectiveness of the department
of homeland security and the tools, tactics and techniques which are available with the
organization will be discussed in the paper.
Types of cyber attack
The different categories of cyber-attack are as followings:
o Eavesdropping attack.
o XSS attack
o Password attack
o SQL injection attack
o Drive-by attack
o Man-in-the middle (MitM) attack.
o DoS
o Phishing attack.
Current science and technology
The extensive development in the field of science and technology has led to the growth of
new means of cyber crimes as well as helpful for the organizations which deals with those
crimes. Massive quantities of data are handled by the cyber criminals with the help of the
machine learning systems (Tehan, 2017). Server less applications enables greater granularity
against the online attacks like SQL injection attack and XSS attack.
Document Page
4CYBERSECURITY
Effectiveness of Department of Homeland Security
The Department of Homeland Security aims to improve the national cyber security risk
management with the help of resilience and security across the government networks and its
associated critical infrastructure.
Tools, tactics, and techniques made available by Department of Homeland
Security
The systems and the techniques used by this organizations are very much useful to minimize
the illegal cyber activities, providing quick response to any cyber security incidents, ensure
reliability of a cyber echo system (Walters, 2014).
The cyber space security of the nation can be effectively managed with the help of the
advanced information systems of this agency along with that US secret service also helps this
organization to deal with complicated cyber security issues.
Conclusion
The paper was very much useful to understand the different categories of cyber-attack and
the science and technology which led to the developments in cyber security. Along with that it
can be also said that the measurements taken by Department of Homeland Security is enough to
deal with the cyber security issues within the government networks and the nation’s cyber space.
Defending and providing security to the security space is done effectively with the help of the
tools and techniques used in the Department of Homeland Security.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5CYBERSECURITY
Reference
Tehan, R. (2017). Cybersecurity: Critical infrastructure authoritative reports and resources.
Congressional Research Service Report, April, 21, 107-56.
Walters, R. (2014). Cyber attacks on US companies in 2014. The Heritage Foundation, 4289, 1-
5.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]