SlideShare a Scribd company logo
1 of 13
Government and cyber sector
Prof. Errol Hewitt
Government and cyber sector
Table of Contents
Propose cyberpolicytoensure the resiliencyof the U.S.Governmentandcritical infrastructure(week5)
Shaping the future cyber environment with respect to cyber security responsibilities………….2
Protecting critical infrastructure from catastrophic events……………………………………………………3
Engage internationally………………………………………………………………………………………………………….4
Secure federal network………………………………………………………………………………………………………..5
Executive summary………………………………………………………………………………………………………………6
Government and cyber sector
1
Propose acyber policy to ensure the cyber resiliency of the government
and critical infrastructure.
On a national and global level, cyber policy will play a major role in the way governments
will handle their critical infrastructure. The nation’s critical infrastructure provides the
essential services that hold the American society. Proactive coordinated efforts are necessary
to strengthen and maintain secure, functioning, and resilient critical infrastructure- including
assets, network, and system- that are vital to public confidence and the nation’s safety,
prosperity, and well-being.
The U.S. government needs a robust network system to function effectively therefore the
nation’s critical infrastructure which is complex and diverse must be operated by experts or
capable individuals. The infrastructure includes distributed networks, varied organization
structures and operating models (including multinational groups) interdependent functions
and systems in both the physical space and cyberspace, and governance constructs that
involve multi-level authorities, responsibilities, and regulations. Critical Infrastructure owners
and operators are positioned tomanage risks to their individual operations, assets, and to
determine effective strategies to make them more secure and resilient.
The infrastructure must be secure and able to withstand and rapidly recover from all
hazards. This will require integration with the national preparedness system across
prevention, protection, mitigation, response and recovery.
Securing critical infrastructure
Government and cyber sector
1a
The U.S. government has been overwhelmedwith cyber attacks from national and
international groups for several decades. In addition, many countries critical infrastructures
have become vulnerable to attacks over the years. Today many of the attacks are focused on
the U.S. government intellectual property as well as the private sector data. According to the
Assistance Secretary of Defense for Homeland Security in October of 2014,” said that the
United States would add deterrence by denial to more, retaliation-based approaches to cyber
deterrence”, he also stated that the biggest problem is that we don’t own the nation’s critical
infrastructure neither, of course does any other part of the federal government”Many of our
critical infrastructures are run by the private sectorso it is that both public and private
sectors strengthen their resilience in new realms, especially in continuity operation.
Cyber security issues have reached the multinational policy-making level in many
developed countries. It has been shown that countries such as Israel alongside with Sweden
and Finland have moved vigorously to tighten their networksystems when comparing many
other countries. Israel’s critical infrastructure protection policy has been built upon the
insights of defense establishment and evolved from a limited involvement with (IT) branches
of government, toward an early adoption of national security, the economy, and
international status.
Government and cyber sector
1b
The US government biggest concern must be towards tighter legislative policies and how
to enforce them. Some of these policies might be seen as responsibilities. Whatever way they
are viewed, they must be mandated as professional authorities. In order to establish some
resilience one must do the following:
 Assess the threat landscape i.e. constant information sharing on a global level.
 Evaluate the source of information by looking for properauthentication.
 Develop protective doctrine and methods.
 Integrate intelligence in all branches and agencies of the government.
 Provide professional instruction in every office of both the private and publicsector.
 Set standards and operating procedures for the benefit of supervised organization.
 Develop technological expertise and cooperation with partners in the US and other
friendly nations.
 Initiate and encourage research and develop defensive capabilities, in cooperation
with the defense community.
There are directives that have been established in the government that are national
policy on critical infrastructure security and resilience. The endeavor is a shared responsibility
among the Federal, State, Local, Tribal, and Territorial (SLTT) entities, and public and private
owners and operators of critical infrastructure. The directive refines and clarifies the critical
the critical infrastructure-related functions, roles and responsibilities across the Federal
Government, as well as enhances overall coordination and collaboration. The Federal
Government has a responsibility to strengthen the security and resilience of its own critical
infrastructure, for the continuity of national essential functions, and to organize itself to
partner effectively with and add value to the security and resilience efforts of critical
infrastructure owners, and operators.
Government and cyber sector
2
Shaping the future cyber environment with respect to cyber security
responsibilities
The future of our cyber environment rests on the measures that are taken in order to
create a safe place to live in. It is the duty or policy of United States to strengthen the security
and resilience of its critical infrastructure against both physical and cyber threats. The Federal
Government must work with critical infrastructure owners and operators and (STLL) entities
to take proactive steps to manage risk and strengthen the security and resilience of the
nation’s critical infrastructure, considering all hazards that could have a debilitating impact
on national security, economic stability, public health and safety, or any combination of
disasters. These efforts are approaches to be used for reducing vulnerabilities, minimize
consequences, identify and disrupt threats and hasten response and recovery efforts related
to critical infrastructure.
The Government must engage with international partners to strengthen the security and
resilience of domestic critical infrastructure and otherinfrastructure located outside the
United States on which the nation depends. It should address the security and resilience of
critical infrastructure’s interconnectedness and interdependency. The policy also identifies
energy and communications systems as uniquely critical due to the enabling functions they
provide across all critical infrastructure sectors.
Three important factors that will drive the Federal approach to strengthen critical security
and resilience:
 Refine and clarify functional relationships across the Federal Government toadvance
the national unity of effort tocritical infrastructure security and resilience;
 Enable effective information exchange by identifying baseline data and systems
requirement for the Federal Government; and
 Implement an integration and analysis function to inform planning and operations
decisions regarding critical infrastructure.
Government and cyber sector
3
Protecting critical infrastructure from catastrophic events
It is important that the government work collaboratively with critical infrastructure
owners and operators to protect the nation’s most sensitive infrastructure from cyber
security threats. Working with industries locally and internationally by sharing information is
an important way to mitigate or reduce vulnerabilities among the private and public sectors.
Securing the nation’s infrastructure requires a networksystem with reliable data, also
individuals who are authorizes to operate with capable tools in any given time. Network of
information sharing must be locally as well as globally.
The Secretary of Homeland Security, in coordination with the Office of Science Policy
(OSTP), the SSAs, DOC and other Federal departments and agencies, shall provide input to
align those Federal and Federally- funded research and development (R@D) activities that
seek to strengthen the security and resilience of the nation’s critical infrastructure including:
 Promoting R@D to enable the secure and resilient design and construction of critical
infrastructure and more secure accompanying cybertechnology;
 Enhancing modeling capabilities to determine potential impacts on critical
infrastructure of an incident or threat scenarioas well as cascading effects on other
sectors;
 Facilitating initiative to incentivize cyber security investment and the adoption of
critical infrastructure design features that strength all hazards security and resilience;
and
 Prioritizing efforts to support the strategic guidance issued by the secretary of
Homeland Security.
Government and cyber sector
3a
The various branches of government must have capabilities of real time communication
by accessing accurate information at every levels of government. The communication system
and the way we communicate are continually evolving so that changes have allowed for
many to have faster and easier way to pass on information. Traditional communications
infrastructure and legacy substation devices are being phased out to make way for next
generation Ethernet and Internet protocol-based packet switch network(PSNs). The
transition to (PSNs) is the move toward smart grids. Packet transport’s high capacity is
required to handle the amount of fluctuating trafficgenerated by the advanced grid
applicationswhich can be seen in such intelligent powernetworks. Another approach is the
use of high- resolution internet protocol- based video surveillance equipment, as well as
wholesale and UTELCO services that provide broadband access for local business and service
providers. Many power utilities around the globe is planning the transformation of its
transmission and distribution grid into an intelligent (PSN) that can efficiently and reliably
handle a large amount of bidirectional or multidirectional data communications among
Internet Protocol supervisory control and dataacquisition (SCADA) systems, IEC 61850
intelligent electronic devices and other substation automation equipment.
Institutions such as the military, has been drawn to the new voice overIP-based technology
because of how robust, reliable, and flexible it is. The military is finding the voice over
internet protocol is an effective technology for secure collaboration and information sharing
on converge network- those that combine voice, videoand data. Defense organizations are
migrating from the isolated, point-to-point communications model of the past towards a
more agile, networked and collaborative environment. In the defense community, converged
networks running on an Internet Protocol (IP) infrastructure enable communications across
compartmentalized organization. Voice and data collaboration tools have been helping many
organizations in decision processes by allowing all parties to share and to evaluate the same
information at the same time.
Government and cyber sector
3b
The (VOIP) is becoming a more effective way to communicate. Standard bodies and
networking vendors are developing secure, collaborative (VOIP) technologies that will
support new defense applications, including security, priority and preemptions; policy
constraining communications, conferencing and collaboration systems; text-based instant
messaging; voice and video; shared whiteboard and applications; and location-based on a
geographic region.
In the past the problem voice communication networks have been plagued with security
issues, which included toll fraud, eavesdropping, call misdirection, identity misrepresentation
and information theft. Public sectorsuch as the military and some private sectors are high
profile target for hackers, which makes it necessary that the highest level of security must be
given to these institutions.
Government and cyber sector
4
Engage internationally
Because cyberspace crosses every international boundary, we must engage with our
international partners .We will work to create incentives for, and build consensus around, an
international environment where states and countries recognize the value of an open,
interoperable, secure, and reliable cyberspace. Oppose efforts to restrict internet freedoms,
eliminate the multi-stakeholderapproach tointernet governance, or impose political and
bureaucratic layers unable to keep up with the speed of technological change. An open,
transparent, secure and stable cyberspace is critical to the success of the global economy.
In each branch of government the roles are carried out because of carefully plan
regulatory policies. The legislative branch looks at the kind of cyber threats, who is it
targeting, why is the threats becoming a concern, and the type of impact it will have on
critical infrastructure. Because of these concerns, the government legislative branch will look
at strengthening the regulatory policies that now exist or remove those that are ineffective.
The judicial system shares information with the (CNCI) agency which interns help in
establishing strong and reliable regulatory policy. The sharing and the interpretation of
information help to create roles that are easily understood and able to follow.
Sharing Information
Government and cyber sector
5
Secure Federal network
Improving the security of all Federal networks by setting clear targets for agencies
and then hold them accountable to achieve those targets. Insist on developing better
technology through the process of research and development. This will enable more rapid
discovery and response to threats to federal data, systems and network. Some agencies that
are crucial in the network are as follows:
 The Department of State in coordination with DHS, SSAs and the Federal department
and agencies, shall engage foreign governments and internationalorganizations to
strengthen the security and resilience of criticalinfrastructure located outside the
United states and to facilitate the overall exchange of best practices and lesson
learned for promoting the security and resilience of critical infrastructure on which the
nation depends.
 The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI),
shall lead counterterrorism and counterintelligence investigations and related law
enforcement activities across the critical infrastructure sector. DOJ investigate,
disrupt, prosecute, and otherwise reduce foreign intelligence, terrorist, and other
threats to and actual or attempted attacks on, or sabotage of, nation’s critical
infrastructure. The FBI also conducts domestic collection, analysis, and dissemination
of cyber threat information, and is responsible for the operation of the National Cyber
Investigative Joint Task Force (NCIJTF). This organization serves as a multi agency
national focal point for coordinating, integrating, and sharing pertinent information
related to cyber threat investigation, with representation from DHS, the Intelligence
Community (IC), the Department of Defense (DOD), and other agencies as
appropriate.
Government and cyber sector
6
Executive Summary
Technology has become interconnected that everyone is now exposed to the pros
and cons of this latest contribution to society. In the last thirty years, our society has become
bombarded with new ways of communication, transportation, and visualization. As a result,
the computers that we use are either stationary ormobile. Along with this sophistication,
come all kinds of draw backs. People who use wireless telephone are more exposed to
vulnerability. Most of us today make transactions online as a result, everything we do and say
is being watched by those who are ready tocreate malicious acts.
Hacker
Government and cyber sector
References
Works Cited
Biesecker,C.(2011).International Strategyforcyberspace. DefenseDaily ,2-4.
Lewis,J.,& Zheng,D.E. (2011). Cyber-threatinformationsharing. CSIS.
Obama,P. (2013). Critical Infrastructure Securityandresilience. Officeof thePress Secretary .
Rohret,D. (2005). ComputerNetworkAttackexploitandvulnerablitytrendforforDepartmentof
Defense. CSCInc,85-86.

More Related Content

What's hot

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of warMark Johnson
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryDavid Sweigert
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentationsvito
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updatesInes Mergel
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Jack Whitsitt
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsAllan Cytryn
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
Marriage of Cyber Security with Emergency Management -- Action Plan
Marriage of Cyber Security with Emergency Management  -- Action PlanMarriage of Cyber Security with Emergency Management  -- Action Plan
Marriage of Cyber Security with Emergency Management -- Action PlanDavid Sweigert
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 

What's hot (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Computers as weapons of war
Computers as weapons of warComputers as weapons of war
Computers as weapons of war
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Mike Alagna
Mike AlagnaMike Alagna
Mike Alagna
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and Recovery
 
Mike Alcorn presentation
Mike Alcorn presentationMike Alcorn presentation
Mike Alcorn presentation
 
Defence white paper
Defence white paperDefence white paper
Defence white paper
 
CT3- STEVENS
CT3- STEVENSCT3- STEVENS
CT3- STEVENS
 
Gao privacy updates
Gao privacy updatesGao privacy updates
Gao privacy updates
 
Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...Introduction to National Critical Infrastructure Cyber Security: Background a...
Introduction to National Critical Infrastructure Cyber Security: Background a...
 
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima NormsBGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
BGF-G7-Summit-Initiative-Official-1 Ise-Shima Norms
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Marriage of Cyber Security with Emergency Management -- Action Plan
Marriage of Cyber Security with Emergency Management  -- Action PlanMarriage of Cyber Security with Emergency Management  -- Action Plan
Marriage of Cyber Security with Emergency Management -- Action Plan
 
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHSInsight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
Insight Session with Dr. Daniel Gerstein, Deputy Under Secretary, S&T, DHS
 
Cyber security issue part b
Cyber security issue  part b Cyber security issue  part b
Cyber security issue part b
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 

Viewers also liked

Estate PLAN ANZ SHORT
Estate PLAN ANZ SHORTEstate PLAN ANZ SHORT
Estate PLAN ANZ SHORTAlex Tees
 
Preguntas de diagnostico
Preguntas de diagnosticoPreguntas de diagnostico
Preguntas de diagnosticoDianaValdezS
 
Ficha de análisis
Ficha  de análisisFicha  de análisis
Ficha de análisisDianaValdezS
 
Introduction to business
Introduction to businessIntroduction to business
Introduction to businessSohail Kakar
 
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul Ávila
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul ÁvilaMapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul Ávila
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul ÁvilaDianaValdezS
 
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl Ávila
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl ÁvilaReseña: La lengua y los hablantes - Lengua y cultura de Raúl Ávila
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl ÁvilaDianaValdezS
 
PEX Award-11-03-13-11-35 -submit
PEX Award-11-03-13-11-35 -submitPEX Award-11-03-13-11-35 -submit
PEX Award-11-03-13-11-35 -submitCarolyn Selin
 
Eca e estatuto do idoso aula 00
Eca e estatuto do idoso aula 00Eca e estatuto do idoso aula 00
Eca e estatuto do idoso aula 00Concur Seiro
 
Squline Mandarin Placement test
Squline Mandarin Placement testSquline Mandarin Placement test
Squline Mandarin Placement testsquline
 
Dissertation - William Overvoorde W11007902
Dissertation - William Overvoorde W11007902Dissertation - William Overvoorde W11007902
Dissertation - William Overvoorde W11007902Will Overvoorde
 
Paris-Research-Paper-2.0
Paris-Research-Paper-2.0Paris-Research-Paper-2.0
Paris-Research-Paper-2.0Claire Roper
 
Panorama de la administración
Panorama de la administraciónPanorama de la administración
Panorama de la administraciónAtento
 
Unidad 6 solucion de ejercicios
Unidad 6  solucion de ejerciciosUnidad 6  solucion de ejercicios
Unidad 6 solucion de ejerciciososwaldo torres
 
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDAD
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDADAPUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDAD
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDADProfessorPrincipiante
 
Estrel Catering Imagebroschüre
Estrel Catering ImagebroschüreEstrel Catering Imagebroschüre
Estrel Catering ImagebroschüreEstrel Berlin
 

Viewers also liked (19)

Estate PLAN ANZ SHORT
Estate PLAN ANZ SHORTEstate PLAN ANZ SHORT
Estate PLAN ANZ SHORT
 
Preguntas de diagnostico
Preguntas de diagnosticoPreguntas de diagnostico
Preguntas de diagnostico
 
Mydashdas
MydashdasMydashdas
Mydashdas
 
Ficha de análisis
Ficha  de análisisFicha  de análisis
Ficha de análisis
 
Introduction to business
Introduction to businessIntroduction to business
Introduction to business
 
Cromatografía
CromatografíaCromatografía
Cromatografía
 
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul Ávila
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul ÁvilaMapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul Ávila
Mapa conceptual de: La lengua y los hablantes- Lengua y cultura de Raul Ávila
 
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl Ávila
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl ÁvilaReseña: La lengua y los hablantes - Lengua y cultura de Raúl Ávila
Reseña: La lengua y los hablantes - Lengua y cultura de Raúl Ávila
 
PEX Award-11-03-13-11-35 -submit
PEX Award-11-03-13-11-35 -submitPEX Award-11-03-13-11-35 -submit
PEX Award-11-03-13-11-35 -submit
 
Hadoop ppt
Hadoop pptHadoop ppt
Hadoop ppt
 
Eca e estatuto do idoso aula 00
Eca e estatuto do idoso aula 00Eca e estatuto do idoso aula 00
Eca e estatuto do idoso aula 00
 
Squline Mandarin Placement test
Squline Mandarin Placement testSquline Mandarin Placement test
Squline Mandarin Placement test
 
Dissertation - William Overvoorde W11007902
Dissertation - William Overvoorde W11007902Dissertation - William Overvoorde W11007902
Dissertation - William Overvoorde W11007902
 
Paris-Research-Paper-2.0
Paris-Research-Paper-2.0Paris-Research-Paper-2.0
Paris-Research-Paper-2.0
 
Panorama de la administración
Panorama de la administraciónPanorama de la administración
Panorama de la administración
 
Unidad 6 solucion de ejercicios
Unidad 6  solucion de ejerciciosUnidad 6  solucion de ejercicios
Unidad 6 solucion de ejercicios
 
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDAD
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDADAPUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDAD
APUNTES PARA REPENSAR UNA FORMACIÓN DOCENTE PARA LA SUSTENTABILIDAD
 
resume
resumeresume
resume
 
Estrel Catering Imagebroschüre
Estrel Catering ImagebroschüreEstrel Catering Imagebroschüre
Estrel Catering Imagebroschüre
 

Similar to Prof E Hewitt

Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxjuliennehar
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docxmecklenburgstrelitzh
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSS. F. (Sid) Nash
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetterDoug DePeppe, Esq.
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNeil McDonnell
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfAlexandre Pinheiro
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchGQ Research
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cybernitay123
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveGovernment
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmapAjay Ohri
 

Similar to Prof E Hewitt (20)

Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter20130917-CyberInitiativeJointLetter
20130917-CyberInitiativeJointLetter
 
National Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of AmericaNational Strategy to Secure 5G of the United States of America
National Strategy to Secure 5G of the United States of America
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
National_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdfNational_Cyber_Security_Strategy.pdf
National_Cyber_Security_Strategy.pdf
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
 
DoD Cyber Strategy
DoD Cyber StrategyDoD Cyber Strategy
DoD Cyber Strategy
 
Department of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in CyberspaceDepartment of Defense Strategy for Operating in Cyberspace
Department of Defense Strategy for Operating in Cyberspace
 
D20110714cyber
D20110714cyberD20110714cyber
D20110714cyber
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Institutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military PerspectiveInstitutional Cybersecurity from Military Perspective
Institutional Cybersecurity from Military Perspective
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Dhs cybersecurity-roadmap
Dhs cybersecurity-roadmapDhs cybersecurity-roadmap
Dhs cybersecurity-roadmap
 

Prof E Hewitt

  • 1. Government and cyber sector Prof. Errol Hewitt
  • 2. Government and cyber sector Table of Contents Propose cyberpolicytoensure the resiliencyof the U.S.Governmentandcritical infrastructure(week5) Shaping the future cyber environment with respect to cyber security responsibilities………….2 Protecting critical infrastructure from catastrophic events……………………………………………………3 Engage internationally………………………………………………………………………………………………………….4 Secure federal network………………………………………………………………………………………………………..5 Executive summary………………………………………………………………………………………………………………6
  • 3. Government and cyber sector 1 Propose acyber policy to ensure the cyber resiliency of the government and critical infrastructure. On a national and global level, cyber policy will play a major role in the way governments will handle their critical infrastructure. The nation’s critical infrastructure provides the essential services that hold the American society. Proactive coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure- including assets, network, and system- that are vital to public confidence and the nation’s safety, prosperity, and well-being. The U.S. government needs a robust network system to function effectively therefore the nation’s critical infrastructure which is complex and diverse must be operated by experts or capable individuals. The infrastructure includes distributed networks, varied organization structures and operating models (including multinational groups) interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical Infrastructure owners and operators are positioned tomanage risks to their individual operations, assets, and to determine effective strategies to make them more secure and resilient. The infrastructure must be secure and able to withstand and rapidly recover from all hazards. This will require integration with the national preparedness system across prevention, protection, mitigation, response and recovery. Securing critical infrastructure
  • 4. Government and cyber sector 1a The U.S. government has been overwhelmedwith cyber attacks from national and international groups for several decades. In addition, many countries critical infrastructures have become vulnerable to attacks over the years. Today many of the attacks are focused on the U.S. government intellectual property as well as the private sector data. According to the Assistance Secretary of Defense for Homeland Security in October of 2014,” said that the United States would add deterrence by denial to more, retaliation-based approaches to cyber deterrence”, he also stated that the biggest problem is that we don’t own the nation’s critical infrastructure neither, of course does any other part of the federal government”Many of our critical infrastructures are run by the private sectorso it is that both public and private sectors strengthen their resilience in new realms, especially in continuity operation. Cyber security issues have reached the multinational policy-making level in many developed countries. It has been shown that countries such as Israel alongside with Sweden and Finland have moved vigorously to tighten their networksystems when comparing many other countries. Israel’s critical infrastructure protection policy has been built upon the insights of defense establishment and evolved from a limited involvement with (IT) branches of government, toward an early adoption of national security, the economy, and international status.
  • 5. Government and cyber sector 1b The US government biggest concern must be towards tighter legislative policies and how to enforce them. Some of these policies might be seen as responsibilities. Whatever way they are viewed, they must be mandated as professional authorities. In order to establish some resilience one must do the following:  Assess the threat landscape i.e. constant information sharing on a global level.  Evaluate the source of information by looking for properauthentication.  Develop protective doctrine and methods.  Integrate intelligence in all branches and agencies of the government.  Provide professional instruction in every office of both the private and publicsector.  Set standards and operating procedures for the benefit of supervised organization.  Develop technological expertise and cooperation with partners in the US and other friendly nations.  Initiate and encourage research and develop defensive capabilities, in cooperation with the defense community. There are directives that have been established in the government that are national policy on critical infrastructure security and resilience. The endeavor is a shared responsibility among the Federal, State, Local, Tribal, and Territorial (SLTT) entities, and public and private owners and operators of critical infrastructure. The directive refines and clarifies the critical the critical infrastructure-related functions, roles and responsibilities across the Federal Government, as well as enhances overall coordination and collaboration. The Federal Government has a responsibility to strengthen the security and resilience of its own critical infrastructure, for the continuity of national essential functions, and to organize itself to partner effectively with and add value to the security and resilience efforts of critical infrastructure owners, and operators.
  • 6. Government and cyber sector 2 Shaping the future cyber environment with respect to cyber security responsibilities The future of our cyber environment rests on the measures that are taken in order to create a safe place to live in. It is the duty or policy of United States to strengthen the security and resilience of its critical infrastructure against both physical and cyber threats. The Federal Government must work with critical infrastructure owners and operators and (STLL) entities to take proactive steps to manage risk and strengthen the security and resilience of the nation’s critical infrastructure, considering all hazards that could have a debilitating impact on national security, economic stability, public health and safety, or any combination of disasters. These efforts are approaches to be used for reducing vulnerabilities, minimize consequences, identify and disrupt threats and hasten response and recovery efforts related to critical infrastructure. The Government must engage with international partners to strengthen the security and resilience of domestic critical infrastructure and otherinfrastructure located outside the United States on which the nation depends. It should address the security and resilience of critical infrastructure’s interconnectedness and interdependency. The policy also identifies energy and communications systems as uniquely critical due to the enabling functions they provide across all critical infrastructure sectors. Three important factors that will drive the Federal approach to strengthen critical security and resilience:  Refine and clarify functional relationships across the Federal Government toadvance the national unity of effort tocritical infrastructure security and resilience;  Enable effective information exchange by identifying baseline data and systems requirement for the Federal Government; and  Implement an integration and analysis function to inform planning and operations decisions regarding critical infrastructure.
  • 7. Government and cyber sector 3 Protecting critical infrastructure from catastrophic events It is important that the government work collaboratively with critical infrastructure owners and operators to protect the nation’s most sensitive infrastructure from cyber security threats. Working with industries locally and internationally by sharing information is an important way to mitigate or reduce vulnerabilities among the private and public sectors. Securing the nation’s infrastructure requires a networksystem with reliable data, also individuals who are authorizes to operate with capable tools in any given time. Network of information sharing must be locally as well as globally. The Secretary of Homeland Security, in coordination with the Office of Science Policy (OSTP), the SSAs, DOC and other Federal departments and agencies, shall provide input to align those Federal and Federally- funded research and development (R@D) activities that seek to strengthen the security and resilience of the nation’s critical infrastructure including:  Promoting R@D to enable the secure and resilient design and construction of critical infrastructure and more secure accompanying cybertechnology;  Enhancing modeling capabilities to determine potential impacts on critical infrastructure of an incident or threat scenarioas well as cascading effects on other sectors;  Facilitating initiative to incentivize cyber security investment and the adoption of critical infrastructure design features that strength all hazards security and resilience; and  Prioritizing efforts to support the strategic guidance issued by the secretary of Homeland Security.
  • 8. Government and cyber sector 3a The various branches of government must have capabilities of real time communication by accessing accurate information at every levels of government. The communication system and the way we communicate are continually evolving so that changes have allowed for many to have faster and easier way to pass on information. Traditional communications infrastructure and legacy substation devices are being phased out to make way for next generation Ethernet and Internet protocol-based packet switch network(PSNs). The transition to (PSNs) is the move toward smart grids. Packet transport’s high capacity is required to handle the amount of fluctuating trafficgenerated by the advanced grid applicationswhich can be seen in such intelligent powernetworks. Another approach is the use of high- resolution internet protocol- based video surveillance equipment, as well as wholesale and UTELCO services that provide broadband access for local business and service providers. Many power utilities around the globe is planning the transformation of its transmission and distribution grid into an intelligent (PSN) that can efficiently and reliably handle a large amount of bidirectional or multidirectional data communications among Internet Protocol supervisory control and dataacquisition (SCADA) systems, IEC 61850 intelligent electronic devices and other substation automation equipment. Institutions such as the military, has been drawn to the new voice overIP-based technology because of how robust, reliable, and flexible it is. The military is finding the voice over internet protocol is an effective technology for secure collaboration and information sharing on converge network- those that combine voice, videoand data. Defense organizations are migrating from the isolated, point-to-point communications model of the past towards a more agile, networked and collaborative environment. In the defense community, converged networks running on an Internet Protocol (IP) infrastructure enable communications across compartmentalized organization. Voice and data collaboration tools have been helping many organizations in decision processes by allowing all parties to share and to evaluate the same information at the same time.
  • 9. Government and cyber sector 3b The (VOIP) is becoming a more effective way to communicate. Standard bodies and networking vendors are developing secure, collaborative (VOIP) technologies that will support new defense applications, including security, priority and preemptions; policy constraining communications, conferencing and collaboration systems; text-based instant messaging; voice and video; shared whiteboard and applications; and location-based on a geographic region. In the past the problem voice communication networks have been plagued with security issues, which included toll fraud, eavesdropping, call misdirection, identity misrepresentation and information theft. Public sectorsuch as the military and some private sectors are high profile target for hackers, which makes it necessary that the highest level of security must be given to these institutions.
  • 10. Government and cyber sector 4 Engage internationally Because cyberspace crosses every international boundary, we must engage with our international partners .We will work to create incentives for, and build consensus around, an international environment where states and countries recognize the value of an open, interoperable, secure, and reliable cyberspace. Oppose efforts to restrict internet freedoms, eliminate the multi-stakeholderapproach tointernet governance, or impose political and bureaucratic layers unable to keep up with the speed of technological change. An open, transparent, secure and stable cyberspace is critical to the success of the global economy. In each branch of government the roles are carried out because of carefully plan regulatory policies. The legislative branch looks at the kind of cyber threats, who is it targeting, why is the threats becoming a concern, and the type of impact it will have on critical infrastructure. Because of these concerns, the government legislative branch will look at strengthening the regulatory policies that now exist or remove those that are ineffective. The judicial system shares information with the (CNCI) agency which interns help in establishing strong and reliable regulatory policy. The sharing and the interpretation of information help to create roles that are easily understood and able to follow. Sharing Information
  • 11. Government and cyber sector 5 Secure Federal network Improving the security of all Federal networks by setting clear targets for agencies and then hold them accountable to achieve those targets. Insist on developing better technology through the process of research and development. This will enable more rapid discovery and response to threats to federal data, systems and network. Some agencies that are crucial in the network are as follows:  The Department of State in coordination with DHS, SSAs and the Federal department and agencies, shall engage foreign governments and internationalorganizations to strengthen the security and resilience of criticalinfrastructure located outside the United states and to facilitate the overall exchange of best practices and lesson learned for promoting the security and resilience of critical infrastructure on which the nation depends.  The Department of Justice (DOJ), including the Federal Bureau of Investigation (FBI), shall lead counterterrorism and counterintelligence investigations and related law enforcement activities across the critical infrastructure sector. DOJ investigate, disrupt, prosecute, and otherwise reduce foreign intelligence, terrorist, and other threats to and actual or attempted attacks on, or sabotage of, nation’s critical infrastructure. The FBI also conducts domestic collection, analysis, and dissemination of cyber threat information, and is responsible for the operation of the National Cyber Investigative Joint Task Force (NCIJTF). This organization serves as a multi agency national focal point for coordinating, integrating, and sharing pertinent information related to cyber threat investigation, with representation from DHS, the Intelligence Community (IC), the Department of Defense (DOD), and other agencies as appropriate.
  • 12. Government and cyber sector 6 Executive Summary Technology has become interconnected that everyone is now exposed to the pros and cons of this latest contribution to society. In the last thirty years, our society has become bombarded with new ways of communication, transportation, and visualization. As a result, the computers that we use are either stationary ormobile. Along with this sophistication, come all kinds of draw backs. People who use wireless telephone are more exposed to vulnerability. Most of us today make transactions online as a result, everything we do and say is being watched by those who are ready tocreate malicious acts. Hacker
  • 13. Government and cyber sector References Works Cited Biesecker,C.(2011).International Strategyforcyberspace. DefenseDaily ,2-4. Lewis,J.,& Zheng,D.E. (2011). Cyber-threatinformationsharing. CSIS. Obama,P. (2013). Critical Infrastructure Securityandresilience. Officeof thePress Secretary . Rohret,D. (2005). ComputerNetworkAttackexploitandvulnerablitytrendforforDepartmentof Defense. CSCInc,85-86.