This website uses cookies to ensure you have the best experience. Learn more

Cyber Security Essay

1953 words - 8 pages

Energy Industry - Cyber-Attacks And Regulations
For many industries relying solely on NIST framework is not enough. The framework is not meant to replace their existing processes of handling cyber threats, however, by using the framework as a base, they can find the gaps in the most important infrastructure and figure out a way to harden and improve its security. For example, the energy industry is one of the most important industries and it has critical role in keeping the country safe. Therefore, most of the cyber-attacks are targeting it. In order to keep it safe, many agencies are involved in improving the best practices and standards for the industry, and hardening its critical ...view middle of the document...

After looking into the evidences, it was concluded that Russia’s motive was not political but was to gain competitiveness. Some firms had lost valuable intellectual property because of Russia’s espionage.
CrowdStrike highlighted that it had been following the activities of Russian hackers for two years, adding that it was believed that the government was behind the campaign because of technical indicators and the type of targets chosen.
On the other hand, the Wall Street Journal reported that in May 25, 2013 Iranian cyber-attackers launched series of infiltration and surveillance missions against energy companies in the United States, and successfully accessed control-system’s software they could have used to manipulate oil or gas pipelines. And it was believed that the Iranians had their hands on very sensitive information of the control systems and they have the ability to disrupt or destroy these systems in the future. The Iranian government denied its involvement in the attack, and mentioned that the cyber security was an "international issue" that needed the "collective efforts" of all the countries, but there is always a room of doubt.
China had its part in the cyber-attacks targeting the energy companies. In February 2011, China launched a coordinated attacks became known by the Night Dragon. These attacks have involved social engineering, spear-phishing attacks, and exploitation of Microsoft Windows operating systems vulnerabilities with the goal to steal sensitive data from targeted organizations.
The graph below highlight the anatomy of the attack

The attacks are many and the objectives vary, some of the countries objective is to destroy the American energy plants such as Iran’s attack, others are for the objective to steal information and intellectual property such as China and Russia. These attacks have moved beyond the legacy defense system and the U.S government has become aware of the threat and is taking serious steps toward improving the safety and security of the infrastructure.
In addition to NIST’s framework, the Department of Energy had set requirement and responsibilities for the Departmental Cyber Security Program (CSP) to protect its information systems. The CSP now is following NIST’s framework and Committee on National Security Systems (CNSS) to conduct an analysis of the threats and make decisions based on the cost and the mission effectiveness.
According to the department of Energy; the Cyber Security Program (CSP) helps in:
• Establishing line management accountability for ensuring protection of information
and information systems.
• recognizing the Department’s federated government-owned/contractor operated (GOCO) environment and appropriately integrates cyber security governance, accountability and reporting into management and work practices at all levels of
the Department.
• Instituting a mission-centric, risk-based approach to the management of cyber security to ensure the confidentiality, integrity, and...

Find Another Essay On Cyber Security

Cyber Security Departments Essay

2823 words - 11 pages what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security. Since these systems rely heavily on technology, governments have to consider them as high-risk targets not only for physical attacks, but also for computer malware attacks. Due to the fact that the risk exists governments have to focus not only

Cyberspace: Cyber Security Essay

1131 words - 5 pages most of the intelligence the US government has ever collected are accessible in cyberspace. Knowing this information brings me to a few questions. How well is this information protected? How does this affect the average person? This is where cyber security comes into to play. Cyber security, in a nut shell, is the attempt to stop any individual from attaining information via cyberspace that they are not supposed to have access to. Cyber

Importance of Cyber Security

2012 words - 8 pages noted, “The government is bringing about unprecedented transparency and liability for Americans to take part in their democracy.” (Obama, 2009). Administration Key Cybersecurity Policy Principals Unequivocally speaking, the threat of a cyber-attack has become one of the most critical domestic and national security challenges we face as a nation today. Infrastructures supporting government operations are a national asset and our defense

Advanced Research Cyber Security

1465 words - 6 pages of attackers. Also in today’s cyber climate it is well known that any organization, no matter the size or prestige, with a cyber-presence is vulnerable to attacks and exploits. The fact is that Advanced Research needs to become proactive in our approach to cyber security. Simply put, the best way to defend our cyber property is to perform comprehensive vulnerability scans across all of our systems. It is my recommendation as the IT Manager that

Overview of Cyber Security

1482 words - 6 pages individuals having access to personal information. To prevent the wrong hands from accessing such material there should be a broader background check of these individuals where such activity can be prevented.   In conclusion, the advancements in technology came with advantages as well as disadvantages. Cyber security is a fortunate advantage for today’s technology and future technology to come. There are various types of security breaches that can

cyber security in the millitary

1155 words - 5 pages . These 1100 people are ,in the words of General Keith Alexander( director of the united states cyber command) responsible for “directing the defense ensuring the operation of the Department of Defense’s information networks, and helping to ensure freedom of action for the United States military and its allies—and, when directed, for defending the nation against attacks in cyberspace”. There are trained personnel that handle the security of most

Cyber Security: A Necessity Nowadays

1557 words - 7 pages computerized. All the transactions and important information are in computers. Cyber Security is now one of the biggest necessities of the world, because our lives resolve around computers, the cyber-attacks are dramatically increasing in number every day, and the cyber attackers are becoming more expert. We are addicted to technology. Americans ages 18-64 who use social networks say they spend an average of 3.2 hours per day doing so(Vacca, 10)The

Cyber Security Controls As a Public Good

2486 words - 10 pages prevent and deter cyber-attacks. A united front to fight cyber-crime requires that a standard set of cyber security controls be established for the public good, but who should be responsible for mandating those controls? Directing cyber security controls involves establishing laws, setting penalties for breaking laws, and creation of foreign policies regarding cyber-crime with other nations. Since laws, penalties, and foreign policy are required

Cyber Security and Surveillance: Bulk Data and Metdata

948 words - 4 pages Subject: Cyber Security and Surveillance: Bulk Data/Metadata Summary: The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat

Implementing Centralized Cyber Security and Device Management System (CCSDMS)

3567 words - 15 pages way for two types of security issues such as social media security issues and smartphone security issues. Thereby we have to eradicate the smartphone and social networking threats by implementing Centralized Cyber Security and Device Management System (CCSDMS). In this project we use Graph Model for Conflict Resolution (GMCR II) software tool, for the effective implementation of Centralized Cyber Security and Device Management System. 2. Social

Cyber security and Forensics

1834 words - 8 pages 1) What uses of the term “security” are relevant to your everyday life? I believe, Security in a more generic sense is relevant to any kind of situations in which we trust a system or a third party to an extent that we are ready to share our private and sensitive information with them. Security is necessary in our everyday life for all kinds of communication in which some kind of data or information is exchanged. For example, telecommunication

Similar Essays

Cyber Security Essay

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

Cyber Security Essay

752 words - 3 pages In contemporary context of global information era, the issue of cyber security is considered to be one of the key elements, which determine overall company's performance, competitive advantage, and image. From the critical point of view, the major controversy of cyber security is embedded between methods of control and monitoring, in particular its centralized or decentralized regulation. Practically, opinions of the specialists in regard to

Cyber Security Essay

2115 words - 9 pages President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” Cyber security is more important than ever; more people are using remote access instead of travelling to the office. Hard drives both mechanical and solid state are being replaced by “cloud computing/storage. A

What Is Cyber Security? Essay

1085 words - 5 pages What is Cyber Security? Cyber Security can be defined as “measures taken to protect a computer or computer system (as on the internet) against unauthorized access or attack”. (Bullock 283). In other words, an attempt by individuals to protect their personal information and other digital resources from attacks from the cyber world. Why is Cyber Security important? Cyber security was created because of the sensitive information that is frequently