Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
Check Instructions
Style:
APA
Subject:
Law
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 14.58
Topic:

Scholarly Activity Cyber Terrorism Law Essay Research

Other (Not Listed) Instructions:

Course Textbook(s)
Martin, G. (2016). Understanding homeland security (2nd ed.) [VitalSource Bookshelf version]. Retrieved from
https://online(dot)vitalsource(dot)com/#/books/978150634613
instructions
Review the information from the resources below, and answer the associated questions.
Part I: Cyberterrorism
Click the link below to view Segment 2 (“Cyber-Terrorism”) of Cybercrime: World Wide War 3.0 in CSU’s Films on Demand database.
Ways Press International (Producer). (2008). Cybercrime: World Wide War 3.0 [Video file]. Retrieved from https://libraryresources(dot)columbiasouthern(dot)edu/login?auth=CAS&url=http://fod(dot)infobase(dot)com/PortalPlaylists.aspx?wID=273866&xtid=40324&loid=65101
Note: The transcript for the aforementioned video segment is available to view and print by clicking on the “Show Transcript” tab on the right side of the video page.
After watching the video, address the questions below:
What is cyberterrorism?
What is the purpose of cyberterrorism?
What are the advantages of cyberterrorism?
Part II: Federal Networks
Click the link below to review the following resource.
U.S. Department of Homeland Security. (n.d.). Securing federal networks. Retrieved from https://www(dot)dhs(dot)gov/topic/securing-federal-networks
After reviewing the resource, address the following issues:
Describe the purpose of the U.S. Department of Homeland Security to secure federal networks.
What is the mission of the National Cyber Security Protection System (NCPS), and what capabilities does it provide to protect the federal government from a cyberterrorism attack?
What is the Continuous Diagnostics and Mitigation (CDM) program, who does it benefit, and what capabilities does the program provide?
What is the purpose of the Federal Information Security Management Act (FISMA)?
Your assignment must be a minimum of three pages in length. Submit Part I and Part II in one document, but make certain to use headings to identify each part. You are required to use at least one outside source other than the textbook. All sources used, including the textbook and associated web links, must be referenced; paraphrased and quoted material must have accompanying APA citations. All sources must be cited in APA format on a separate reference page. The reference page does not count toward meeting the minimum page requirement.
You should still have my login to my student portal at Columbia Southern University. If not it is; 187017, AFsp0781. This way you can login and click on the links. any questions let me know. Thnaks

Other (Not Listed) Sample Content Preview:

Cyber Terrorism
Name
Institution
Part I
Cyber Terrorism
Cyber terrorism is the intentional attack against information, computer systems, and data that culminates in violent actions by clandestine groups against non-combatant victims. Therefore, cyber terrorism is the coming together of terrorism and cyberspace. Terrorists only require a computer and an internet connection. Through the internet, they can learn how to create or access a weapon, deliver computer viruses through cable or Wi-Fi among others. In cyberspace, there are no physical impediments and could be conducted remotely and anonymously.
The goal of cyber terrorism is only not defined by the hundreds killed but the center is on the media coverage that reaches millions worldwide. Journalists and the public get fascinated by such events as computer attacks. The entire furor associated is immensely interesting due to the unequaled attention it gets from the government. The headline in every news outlet is the ultimate target of a terrorist. The TV augments the assailant making them seem lethal to the populace.
Cyber terrorism is preferable by hackers as it is a reservoir of income. It also assists in the hunt for fame and glory from their nationalistic goals. The hackers are considered heroes as they help uphold the country’s honor against anti-regime forces. A good example is the Republic of China where there are hacking organizations for instance the pro-Tibet movements. The funding comes from worldwide as the groups sell the data they steal in the black market; they sell malware services or even computers and hacker tools. Cyber-attacks also do not require significant funding, complex weaponry, or personnel. This kind of terrorism can be conducted remotely, anonymously, and contain an element of surprise (Ways Press International, 2008).
Part II
Purpose of U.S. Department of Homeland Security
The federal enterprise relies on Information Technology infrastructure and computer networks for its operations. These systems are vulnerable to numerous cyber threats that originate from inexperienced hackers to sophisticated intruders by the use of state-of-the-art intrusion methods. All these attacks are expected to steal information and upset, degrade, destroy, or threaten essential information services. In November 2018, President Donald Trump signed into law the Cyber and Infrastructure Security Agency Act of 2018. The legislation instituted the Cyber security and Infrastructure Security Agency (CISA) within the Department of Homeland Security (DHS).
CISA aims to guard the nation against cyber-attacks and engages with the federal government to offer cyber security tools, incident response services, and evaluation capabilities to safeguard the government networks which support essential operations of departments and agencies.
CISA also works to advance the adoption of common policies and practices which are risk-based and can respond...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to terrorism essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!