INTL440 week eight discussion

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

440

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by JusticePartridgePerson863

Report
With the world always evolving so have the types of attacks across the globe. Although as we have seen war is still a thing and we still live in a world of army's fighting one another for their cause. But we are also seeing the evolution of cyber warfare and it is not going anywhere anytime soon. Because of this we need a new defense strategy which will allow faster response times and deter our enemies from conducting future attacks. Cyber intelligence is a very precise and accurate way of gathering Intel on the United States and other nations across the globe. Our cellphones and the internet are the more popular methods for corruption and gathering intelligence against our nations security. When a cyber attack happens the Department of Homeland Security is one of the first to help out and analyze the intelligence gather to determine the possible effect an attack would have on our infrastructure. While working with local law enforcement they can creative an effective response to possible cyber attacks. The department works with other organizations that have the same cyber mission in order to safeguard themselves creating a combined effort which will allow a better end result. A cyber incident response plan is needed which is a plan for attacking cyber threats and cyber attacks. Organization's use these plans to protect themselves and lessen the threat of cyber viruses and hackers. To stay ahead of these situations organizations need to be prepared, be able to detect and identify, they must contain, remediation, recovery, and reporting. Being able to prepare for these incidents will ensure organizations are not caught off guard. Being able to detect and identify will let organizations select the appropriate response. We must contain to limit the spread of an attack. Our reporting system is what allows us to track attacks and create systems that can help other organizations prevent future attacks. References. "Cybersecurity in the Intelligence Community's 2015 Worldwide Threat Assessment." Just
Security. Last modified March 7, 2015. "The National Cyber Incident Response Plan (NCIRP)." Homepage | CISA. Accessed November 16, 2020. https://www.us-cert.gov/ncirp.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help