Tuesday, December 24, 2019

Cyber Security Policies and Defense Contractors Essay

Abstract Cyber security policies in the private sector have been a challenging issue for major defense contractors, especially after recent attacks. As a result, the U.S. increased its strict enforcement against these companies by justifying its intervention to improve cyber security. The government would like to impose standards for companies who lack the proper protocol. Due to the revised and new procedures, corporations are responding by rejecting any congressional intervention. This has caused major friction in the relationship between the government and industry. The executive, judicial and legislative branch believes its responsibility is to provide cyber security capabilities to protect all information at contractor facilities.†¦show more content†¦On May 31, 2011, Lockheed Martin suffered a massive cyber attack. Hackers were able to exploit systems, hardware and keys to gain vital information associated with the company and programs for the U.S. government. Similarly, Booz Allen military emails were hacked by a group called LulzSec, which claimed to be associated with Anonymous. According to Washington Technology, the group copied thousands of emails, passwords and distributed them throughout the internet. Although defense contractors disagree, the government is still trying to justify ways to set up and improve their cyber security. This document will give an assessment of why the government chooses to justify telling private industries how to manage or upgrade their cyber security through various reasons, motivations and arguments. In addition, this evaluation will give methods and real world examples to support their justification. Lastly, this review will explain the impacts/effects on the national security due to government regulation with real-world illustrations to support their position. Body The government is giving socio-political reasons to justify their involvement to improve industry cyber security. The government believes if a defense contractor has a federal contract, then they have the justification needed to be involved in improving their security protocols. These contracts support multiple national agencies that have criticalShow MoreRelatedEssay about The Impact of the RSS Breach on Critical Infrastructure 1211 Words   |  5 PagesRSA is a division of EMC Corporation that offers security products to businesses and government agencies. RSA’s flagship product is SecurID, a combination of two-factor authentication tokens (hardware and software) and the associated server software used in their implementation. This product aims to deliver secure remote access, including access to critical i nfrastructure. In 2009, it was estimated RSA had â€Å"about 40 million tokens and 250 million mobile software versions deployed in over 25,000 organizations†Read MoreThe Future For National Security1496 Words   |  6 Pages As the world moves forward, there are new threats that arise and it is difficult to handle each one. One of the largest threats to any country are cyber-attacks/computer hacking. Each day on the news there is a developing story about a country’s data base being hacked by an anonymous source and all the classified files were exposed to the public. As a result, cybersecurity has increased significantly in the countries that can afford it. The United States and China have recently increased spendingRead MoreAnalysis Of Dod Contracts1000 Words   |  4 Pages Microsoft Visio, Microsoft Project, and Adobe Reader. Department of Defense (DoD) is a federal agency which deals with the national security and military. The security policies that are set up should be followed by not only DoD but also the organization who work with and contractual services provided to them. The information shared is naturally highly sensitive, so we should implement proper steps in maintaining security over the contracts. DOD-specific requirements for an organization’s ITRead MoreSocial Media Effects On The Military1486 Words   |  6 Pagesâ€Å"On 25 February 2010, US Deputy Secretary of Defense William J. Lynn III issued the first directive-type memorandum (DTM) on the ‘Responsible and Effective Use of Internet Capabilities,’ and within months, service members had access to SNSs on their computers at work† (Waldvogel, 2017, p. 119). Social media has positive and negative effects on the military. The negative effects, not only affect the individual or the military, but also the national security of the country. Social media poses threatsRead MoreSecurity Firm Symantec : An Evolving National Strategy984 Words   |  4 PagesUnfortunately, with the rise of interests and increasing in exports it was only a matter of time before the industry of aerospace, defense, and security was going to experience cybersecurity threats. In this industry, vulnerabilities such as compromised Personally Identifiable Information (PII), Distributed Denial of Service (DDoS) attacks on the critical infrastructure to attacks such as economic espionage exist. â€Å"Agencies and companies are facing significant and ongoing cybersecurity and safetyRead MoreManaging Information Security Risk Of A Cyber Attack804 Words   |  4 PagesNext, AAE will use the NIST SP 800-39: Managing Information Security Risk to generate a response for each risk. Note that three of the risks are global risks; the data breach, terrorist, and rising fuel prices risks all stem from AAE’s global marketplace activities. According to the SP 800-39, AAE could utilize one of five strategies to respond to risk. It could choose to: 1) accept risks, 2) avoid risks, 3) transfer/share the risks, 4) mitigate the risks, or 5) avoid the risks. Following are theRead MoreFice Of Personnel Management Essay1715 Words   |  7 PagesExplains how adhering to the fundamental principles of security practice: the Confidentiality, Integrity and Availability (CIA triad), combined with risk management policies we have learn in the previous weeks, as well as incorporating the importance of organizational culture that could lead to a path of preventative cybersecurity. Later in the paper we will examine further on the fundamentals of security practice that would create strong cyber defense posture. EFFECTIVE CYBERSECURITYRead MoreChina s Cyber Attacks Against Us Military2251 Words   |  10 PagesChina’s Cyber Attacks Against US Military Associated Private Firms Introduction: Based on current sources available, we have medium confidence that China will continue to conduct cyber espionage against United States defenses and military systems. It is not a new development as China’s People’s Liberation Army (PLA) cyber team has been behind many attacks against US defense firms and military systems as early as 2007. The KIQ for this assessment is: How vulnerable our Military and Defense sectorsRead MoreThe Dangers Of The Global Financial Institutions1341 Words   |  6 Pagesfinancial institution are penetrated by the third party, the results may be catastrophic. Another good illustrations include 2007 hack of the TJX Companies, Inc. (over 95 m user accounts were compromised), 2011 cyber assault of the Sony Corporation (over 77 m user accounts were compromised), 2008 cyber assault on the Bank of New York (over 12 m user accounts were compromised) and several other notable incidents (Chwan, 2013). Not only the companies incur heavy financial losse s as a result of data theftRead MoreCyber Security : The Threat Of The Digital Age1811 Words   |  8 PagesSome of the potentially greatest threats to our national security revolve around that of a computer network. These networks are vulnerable to human error, negligence, and internal sabotages. In the years of 2014 and 2015 the United States Intelligence Community’s threat assessment placed cyber security as the top priority. External attacks on computer mainframes and data networks that contain critical intelligence are being recognized as the nation’s most vulnerable weakness and steps must be taken

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.