*Assume the role of a security management team planning for interagency cooperation and emergency preparedness related to terrorist acts
*Obtain and use information from the Department of Homeland Security; federal; state; and local law enforcement; corporate best practices; and so forth.
* Develop an organizational security plan that addresses key points for preparedness in relation to five potential terrorist threats.
The part of the plan I am having trouble with is cyber-terrorism and Symbolic target attacks:
I need help on cyber-terrorism (computer attacks against government, military, infrastructure, financial, etc).
Finally, I need some assistance with Symbolic Target Attacks (Attacks against symbolic targets such as the Statue of Liberty, or the National Archives, etc.)
Please find below my solution that you can use in responding to your homework.
Thank you for patronizing BrainMass.
According to Denning, 2000, "Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives." Some companies have included cyberterrorism as a part of their disaster recovery plans and policies and procedures manuals. They have also conducted cyber terrorism training for employees and staff.
Cyberterrorism poses great threat and companies have designed organizational security plans and policies to address the cyber terrorist threat and protect themselves. According to Computer Emergency Response Team (CERT), the following practices that can be implemented to improve security: (1) Establish secure configurations to secure systems; (2) Be ready for detection and other intrusions; (3) Detect intrusions quickly; (4) Quickly respond to intrusions to reduce damage; (5) Always do measures that improve security to anticipate future attacks.
Other precautionary measures include having passwords for all accounts; changing network configuration whenever there are defects; check and upgrade if needed; check logs and audit systems to trace an intruder; and don't access suspicious sites or emails from unknown addresses.
An organization can also implement security testing process by identifying the test strategy and ...
913 words; 6 references; Cyberterrorism and Symbolic Target Attacks