Explore BrainMass
Share

Internet & Security During Emergencies

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Although emergency planning and operations have been conducted without a real consideration of integrating Internet into emergency operations, recent developments in Internet and computer technology have made it possible to change the ICS to allow for stronger (an assumption) external control of all types of emergencies.

There are obvious advantages and disadvantages to using Internet during emergencies. One problem is that the Internet was not developed with security in mind. There is no governing body on the Internet to ensure compliance with security measures. Although freedom from authority fosters innovation, it has an adverse effect on security.

The distributed denial of service (DDoS) attacks in February 2000 illustrate how lax individual security can affect Internet security. Attackers used intermediary sites to launch attacks on the targeted sites. These activities were not transparent to the intermediate sites. Consequently, the intermediate sites did not realize they needed to implement security measures to prevent the attackers from using them to attack the targeted sites; further, they had no motive, other than general good will, to close the vulnerabilities on their sites that facilitated the DDoS attacks.

Without some central authority to ensure full implementation of security measures, each organization is more or less on its own and can be at the mercy of other organizations whose concern about security is far less than their own, or maybe even nonexistent. For local and state emergency response agencies to trust the Internet with their most sensitive data, additional precautions must be taken to ensure the right people are accessing the emergency response networks and that only authorized users can read transient data.

Based on this brief discussion, do you believe that the significant use of Internet in emergency operations will be limited until they can be conducted safely on the Internet?

© BrainMass Inc. brainmass.com October 17, 2018, 1:01 pm ad1c9bdddf
https://brainmass.com/business/managing-teams/internet-security-during-emergencies-598933

Solution Preview

Thank you for requesting me. I hope this helps. Please let me know if you have any questions.

I believe the significant use of the Internet in emergency operations will be limited until these operations can be conducted safely on the Internet. As the case study states, the Internet lacks a governing body and is susceptible to being used for malicious activity (Morozov, 2010). In an emergency, there is little time to weigh the validity of information and secure clear Internet channels for all. However, during emergencies, communication is of the utmost importance: to communicate ...

Solution Summary

This solution provides a discussion about whether the Internet should be used during emergency operations in light of the idea that communication could be compromised. It includes citations and APA formatted references.

$2.19
Similar Posting

Homeland Security and Emergency Management

Those responsible for the Mumbai terrorist attacks of November, 2008 used readily available technologies. The terrorists in this case were committed to carrying out a horrific plan and found the simplest, most effective method was through equipment found in any mall.
•Using the Web resources, library, or textbook, research the events that comprised the attacks in Mumbai, India.
•In light of the available capabilities in modern technologies, such as cell phones, handheld devices, and the Internet, was the Mumbai event considered an unexpected event? Why or why not? ◦Be sure to use your research to support your arguments.

•What are 2-3 other historical accounts of technologies or inventions used for terrorist acts? ◦Summarize each of the selected events, and explain why they were significant uses of technology.

•Be sure to reference all sources using APA format.

View Full Posting Details