Unit VI: Part I Cyber-terrorism
As the world technology advances, so do the threats undermining these inventions do. Cybercrime remains a dominant issue facing modern society due to the increased design of better networks like 4G and 5G networks. This problem has been prevalent since the end of the Second World War (Blakemore, 2016). Attempts made to counter this issue remain in utter failure, clearly depicting the continued rise of cyber-warfare. In this light, the movie Cybercrime: World Wide War 3 outlays the adverse effects that are facing the current world, the role of cybercrime, and the relative advantages they pose. According to Cybercrime: World Wide War 3, cybercrime or rather cyber-warfare constitutes the crimes committed through the internet using the computer as a tool or as the victim of such actions (Ways Press International, 2008). Also, it reflects on the intentional use of computers, networks, and public internet to spread harm or destruction as personal or group objectives. According to the film, cyber-terrorism will occur at any time since the cyber-space has no border checks, customs agents, or other checkpoints, unlike other forms of terrorism (Ways Press International, 2008). Also, it is noted that the government and the media focus more of their attention mostly on cyberterrorism as the Federal Bureau of Investigations spearhead the government actions against such attacks. The implications of cyberterrorism constitute leveraging of a target’s computer or phone in an aim to obtain information that would cause physical harm, or a real-world attack or even to some extremes disrupt a state’s infrastructure (Blakemore, 2016). Cyber-crime comes along with fear, significant physical harm, for instance, if it is used to deploy internet controlled nuclear weapons for mass murder. Also, it is characterized by the death of populations using electronic means based on the current protective technologies.
Part II
US Department of Homeland Security in Cybersecurity
U.S. Department of Homeland Security (n.d.) states that due to the increased threats faced by the United States against malicious actors who contend to use cyberspace, the DHS has revolutionized its roles to ensure increased cybersecurity at the national level. According to the DHS, the threats may impact both federal and non-federal information systems which will increase the attempted incursions made on the US government databases and information banks (U.S. Department of Homeland Security, n.d.). The DHS identifies vulnerabilities such as broad availability, low costs, and increased capability of cyber tools and associates them as the inducing factors to the rising cybercrimes. For instance, the rise of ransomware has impacted both frontline systems and even backup information drives. In light of this, the DHS has secured a vital role in ensuring the mitigation of cyberattacks. Firstly, the Department of Homeland Security aims at assessing the evolving cybersecurity risks that will aid it in informing and prioritizing risk management practices. Also, the department aims at reducing the vulnerability of the federal government’s information systems, which are at a higher risk of intrusion by various cyber criminals (U.S. Department of Homeland Security, n.d.). In this attempt, there will be decreased exposure to such vital information, therefore, achieving an adequate degree of cybersecurity. Also, the DHS intends to reduce the threats by disrupting the illegal use of cyberspace where these efforts will be integrated into countering transnational criminal forums and the sophisticated cyber attackers. At the same time, the National Cyber Security Protection System (NCPS), formed under the critical infrastructure department of the Department of Homeland Security, aims at safeguarding the federal government from cyber attacks. The mission of the NCPS is to collaborate with the private sector, the government, military, and other intelligence agencies to ensure a thorough risk assessment is conducted to mitigate the vulnerabilities to cyber threats. More so, the system provides a new cyber threat analysis and warning to the government on any impending incidences of cyberattacks (U.S. Department of Homeland Security, n.d.). It is the DHS department that extends its role to carry out the majority of the responsibilities the department has on cybersecurity as stipulated under the Comprehensive National Security Initiative. To achieve its functions, the NCPS has intended to build and maintain an effective national response system in cyberspace. Also, the department aims at implementing a cyber-risk management plan to safeguard the government’s critical infrastructure.
Additionally, the Continuous Diagnostics and Mitigation (CDM) programs are available to ensure that government network security is enhanced through automated control testing (Cox & Kneidinger, 2017). It benefits the cybersecurity defenders, for instance, the Department of Homeland Security and other cybersecurity agencies to identify and avert flaws associated with network speed. It also lowers the operational risks, and the exploitation advanced to the government by cybercriminals. CDM provides federal agencies with tools and right capabilities to identify cyber-security risks on an ongoing basis, therefore prioritizing how to counter these risks and ensure cybersecurity (Cox & Kneidinger, 2017). As an alternative to ensure cybersecurity, the government is protected under the Federal Information Security Management Act (FISMA), which is a US legislation policy that protects the state’s information against internal or external threats. It provides a comprehensive framework and analogy that offers regulations for federal data security standards. The primary role of FISMA is to reduce the risks aimed at compromising the security of national data as well as overseeing the federal spending on information security.
References
Blakemore, B. (2016). Policing cyberhate, cyber threats, and cyber-terrorism. Routledge
Cox, K., & Kneidinger, M. (2017). Protecting the crown jewels of the government through infrastructure resilience and the DHS Continuous Diagnostics and Mitigation program. Cyber Security: A Peer-Reviewed Journal, 1(2), 147-155.
U.S. Department of Homeland Security. (n.d.). Securing federal networks. Retrieved from https://www.dhs.gov/topic/securing-federal-networks
Ways Press International (Producer). (2008). Cybercrime: World Wide War 3.0 [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login?auth=CAS&url=http://fod.infobase.com/PortalPlaylists.aspx? wID=273866&xtid=40324&loid=65101