Explore BrainMass
Share

Explore BrainMass

    Security Management

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    *Assume the role of a security management team planning for interagency cooperation and emergency preparedness related to terrorist acts
    *Obtain and use information from the Department of Homeland Security; federal; state; and local law enforcement; corporate best practices; and so forth.
    * Develop an organizational security plan that addresses key points for preparedness in relation to five potential terrorist threats.

    The part of the plan I am having trouble with is cyber-terrorism and Symbolic target attacks:

    I need help on cyber-terrorism (computer attacks against government, military, infrastructure, financial, etc).

    Finally, I need some assistance with Symbolic Target Attacks (Attacks against symbolic targets such as the Statue of Liberty, or the National Archives, etc.)

    © BrainMass Inc. brainmass.com October 10, 2019, 1:07 am ad1c9bdddf
    https://brainmass.com/business/business-law/security-management-321862

    Solution Preview

    Hello,

    Please find below my solution that you can use in responding to your homework.

    Thank you for patronizing BrainMass.

    Sincerely,
    Your OTA

    CYBERTERRORISM:

    According to Denning, 2000, "Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives." Some companies have included cyberterrorism as a part of their disaster recovery plans and policies and procedures manuals. They have also conducted cyber terrorism training for employees and staff.

    Cyberterrorism poses great threat and companies have designed organizational security plans and policies to address the cyber terrorist threat and protect themselves. According to Computer Emergency Response Team (CERT), the following practices that can be implemented to improve security: (1) Establish secure configurations to secure systems; (2) Be ready for detection and other intrusions; (3) Detect intrusions quickly; (4) Quickly respond to intrusions to reduce damage; (5) Always do measures that improve security to anticipate future attacks.

    Other precautionary measures include having passwords for all accounts; changing network configuration whenever there are defects; check and upgrade if needed; check logs and audit systems to trace an intruder; and don't access suspicious sites or emails from unknown addresses.

    An organization can also implement security testing process by identifying the test strategy and ...

    Solution Summary

    913 words; 6 references; Cyberterrorism and Symbolic Target Attacks

    $2.19