Order Number |
456yu89op8 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Emerging Threats and Countermeas Assignment
( 11/17/2019 ) ( Originality Report )
( https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=232e4f03-049f-4a37-83f1-3c39cf2ab51d… 1 /5 )
SafeAssign Originality Report
Fall 2019 – Emerging Threats & Countermeas (ITS-834-42) (ITS-834-43… • Annotated Bibliography
View Originality Report – Old Design
Total Score: High risk
100 %
Total Number of Reports
1
Highest Match
100 %
Annotated_Bibliography_Nov16.docx
Average Match
100 %
Submitted on
11/16/19
09:48 PM EST
Average Word Count
1,092
Highest: Annotated_Bibliography_Nov16.…
Attachment 1
Institutional database (3)
100 %
Word Count: 1,092 Annotated_Bibliography_Nov16.docx
100 %
( 3 ) ( 1 ) ( 2 )My paper Student paper Student paper
Top sources (3)
( 3 ) My paper
( 1 ) Student paper
( 2 ) Student paper
Excluded sources (0)
Running Head: 1 PROTECTING NATIONAL INFRASTRUCTURE 2
Bibliography
1 PROTECTING NATIONAL INFRASTRUCTURE
Annotated Bibliographies
Peiran, W. (2017). 3 China’s Perceptions of Cybersecurity. Georgetown Journal of International Affairs, 35-40. Retrieved from
http://www.jstor.org.gate.lib.buffalo.edu/stable/43134336
Peiran illustrates in this article China’s approach to enhancing performance in its national infrastructure and cybersecurity. Peiran takes us through China’s bureaucracy, cybersecurity, and infrastructure development strategy together with policies. Although the author does not provide in-depth knowledge on this, he provides substantial information on the approach adopted by China’s think tank to balance cybersecurity with strategic necessities as well as the military preparedness. China’s rapid technological and economic growth in the last 35 years has made the government put elaborate measures to counter any potential threat to the country’s Critical National Infrastructure. Concerning this, the government has taken the responsibility of regulating the country’s internet as well as monitoring information circulating in the country. This has helped in the creation of a security layer against any power interested in overturning the nation’s cyber assets.
Ridley, G. (2011). 3 National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. Journal of Business Ethics, 103(1), 111-125. Retrieved
from http://www.jstor.org.gate.lib.buffalo.edu/stable/41476014
In this article, Ridley describes how private entities should be held accountable for the security and safety of the country’s National Infrastructure with data of the citizens included. The recent breaches on data in various public and private companies like Target, Experian LifeLock. It is interesting for LifeLock to be in this category, considering that this company is mandated with customer protection from any form of data breaches. Although this article discusses information relating to critical infrastructure resilience in terms of traditional sense like roads and railways, it emphasized the need to guarantee online infrastructure security for the citizens by the state and private companies as well. The article also illustrates multiple layers of security that are required not only for cybersecurity but an obligation for public relations. It also provides that there is a need for private companies to support judicial processes aimed at enforcing laws that counter cybercrime. A good example of this is demonstrated by the handling of data in Facebook by Cambridge Analytica. The article talks about multiple layers of security needed and just not a mere theatrical façade of cybersecurity as a public relations obligation. It talks about private companies’ need to support the judicial system in enacting and enforcing the law against online crime – an example of which we saw in the recent turn of events with Facebook and it’s handling of data with Cambridge Analytica
( Maglaras , L. 3 A., Kim, K. H., Janicke , H., Ferrag , M. A., Rallis, S., Fragkou , P., & Cruz, T. J. (2018). 3 Cybersecurity of critical infrastructures. CT Express ,4 (1), 42-45. This article discusses the modern security concept as well as data acquisition. This is very important in helping to manage and monitor the national electric power generation, power transmission, and distribution. The article is significant in that it elaborates on the use of Security Concept and Da ta Acquisition, SCADA in the modern world of the internet, and preventing any new system threats. SCADA has been discussed to contain many security features that can be effectively applied by the defense forces in the protection of National Infrastructure. This applies to both the high-efficiency system’s real-time intrusion and the low efficiencies. Moreover, this article also illustrates on Industrial Control Systems that are effective in the counter-attack missions like energy, manufacturing and communication intrusion. It is as well very efficient in subduing intruders who are very hostile and whose main aim is to stage a series of attacks on everyday state operations. Göztepe , K., Kılıc , R., & Kayaalp , A. (2014). 3 Cyber Defense in Depth: Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering ,10 (1), 1-3 The authors of this article provided that human beings have resulted to use of mobile devices due to the emergence of mobile devices, a thing that has made them operate in the cyber world, along with the real physical world. With this, attacks on national infrastructure have consequently shifted with this technological growth from being land-based to cyber-attacks. The article illustrates that this is development is necessitated by cyberspace expansion which is creating a high potential for cyber-attacks. The article is cautioning that cyberattacks might outsmart the government operatives in harming National Infrastructure if sophisticated cyber counter – attack techniques are not adopted by the government. )
( Deibert , R. (2015). Cybersecurity: 3 The new frontier. Great Decisions, 45-58. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/stable/43682574 This article explains that cyberspace is a product of global digital electronic as well as telecommunications; it is not just a mere internet. The author explains that at any given time, either the internet or the telecommunication will lead to huge fi nancial loses for the clients and in some situations, to a given country’s economy. The article has manifested how tools of social media together with the internet have impacted the geopolitical landscape and the even in some cases, a country’s economy. This very interesting article talks about how the internet and social media tools have changed the geopolitical landscape in the best democratic countries as well as toppling dictatorial regimes and staging revolutions in different parts of the world. Cyberspace has highly influenced world politics. This article illustrates the importance of investing in cloud infrastructure for cyber spying operations. It has as well-illustrated internet implications and the failures of cybersecurity on the economic, geopolitical and social aspects of society. References Maglaras , L. 3 A., Kim, K. H., Janicke , H., Ferrag , M. A., Rallis, S., Fragkou , P., & Cruz, T. J. (2018). 3 Cybersecurity of critical infrastructures. CT Express ,4 (1), 42-45. Göztepe , K., Kılıc , R., & Kayaalp , A. (2014). 3 Cyber Defense in Depth: Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering ,10 (1), 1-3 Deibert , R. (2015). Cybersecurity: 3 The new frontier. Great Decisions, 45-58. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/stable/43682574 Peiran, W. (2017). 3 China’s Perceptions of Cybersecurity. Geor getown Journal of International Affairs, 35-40. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/stable/43134336 Ridley, G. (2011). 3 National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. Journal of Business Ethics, 103(1), 111-125. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/stable/41476014 )
( 1 Student paper 82 % Student paper PROTECTING NATIONAL INFRASTRUCTURE 2 Original source protecting national infrastructure ) ( 3 My paper 98 % Student paper China’ s Perceptions of Cybersecurity. Georgetown Journal of International Affairs, 35-40. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43134336 Peiran illustrates in this article China’s approach to enhancing performance in its national infrastructure and cybersecurity . Original source China’s Perceptions of Cybersecurity Georgetown Journal of International Affairs, 35-40 Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43134336 This author of this article, Peiran, illustrates China’s approach to enhancing performance in its national infrastructure and cybersecurity ) ( 2 Student paper 100 % Student paper University of Cumberlands Original source University of the Cumberlands )Source Matches (25)
1 Student paper 100% | |
Student paper
PROTECTING NATIONAL INFRASTRUCTURE |
Original source
protecting national infrastructure |
( 3 My paper 100 % Student paper It talks about private companies’ need to support the judicial system in enacting and enforcing the law against online crime – an example of which we saw in the recent turn of events with Facebook and it’s handling of data with Cambridge Analytica . Original source It talks about private companies’ need to support the judicial system in enacting and enforcing the law against online crime – an example of which we saw in the recent turn of events with Facebook and it’s handling of data with Cambridge Analytica ) ( 3 My paper 100 % Student paper This has helped in the creation of a security layer against any power interested in overturning the nation’s cyber assets. Original source This has helped in the creation of a security layer against any power interested in overturning the nation’s cyber assets ) ( 3 My paper 100 % Student paper A., Kim, K. H., Janicke , H., Ferrag , M. A., Rallis, S., Fragkou , P., & Cruz, T. Original source A., Kim, K H., Janicke , H., Ferrag , M A., Rallis, S., Fragkou , P., & Cruz, T ) ( 3 My paper 100 % Student paper National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. Journal of Business Ethics, 103(1), 111-125. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ s table/41476014 Original source National Security as a Corporate Social Responsibility Critical Infrastructure Resilience Journal of Business Ethics, 103(1), 111-125 Retrieved from http://www.jsto r.org.gate.lib.buffalo.edu/ stable/41476014 ) ( 3 My paper 100 % Student paper Cybersecurity of critical infrastructures. CT Express ,4 (1), 42-45. This article discusses the modern security concept as well as data acquisition. This is very important in helping to manage and monitor the national electric power generation, power transmission, and distribution. Original source Cybersecurity of critical infrastructures CT Express,4(1), 42-45 This article discusses the modern security concept as well as data acquisition This is very important in helping to manage and monitor the national electric power generation, power transmission, and distribution ) ( 3 My paper 100 % Student paper In this article, Ridley describes how private entities should be held accountable for the security and safety of the country’s National Infrastructure with data of the citizens included. The recent breaches on data in various public and private companies like Target, Experian LifeLock . It is interesting for LifeLock to be in this category, considering that this company is mandated with customer protection from any form of data breaches. Although this article discusses information relating to critical infrastructure resilience in terms of traditional sense like roads and railways, it emphasized the need to guarantee online infrastructure security for the citizens by the state and private companies as well. Original sourc e In this article, Ridley describes how private entities should be held accountable for the security and safety of the country’s National Infrastructure with data of the citizens included The recent breaches on data in various public and private companies like Target, Experian LifeLock It is interesting for LifeLock to be in this category, considering that this company is mandated with customer protection from any form of data breaches Although this article discusses information relating t o critical infrastructure resilience in terms of traditional sense like roads and railways, it emphasized the need to guarantee online infrastructure security for the citizens by the state and private companies as well )
( 3 My paper 98 % Student paper Peiran takes us through China’s bureaucracy, cybersecurity , and infrastructure development strategy together with policies. Although the author does not provide in-depth knowledge on this, he provides substantial information on the approach adopted by Chin a’s think tank to balance cybersecurity with strategic necessities as well as the military preparedness. China’s rapid technological and economic growth in the last 35 years has made the government put elaborate measures to counter any potential threat to the country’s Critical National Infrastructure. Concerning this, the government has taken the responsibility of regulating the country’s internet as well as monitoring information circulating in the country. Original source Peiran takes us through the country’s bureaucracy, cybersecurity , and infrastructure development strategy together with policies Although the author does not provide in-depth knowledge on this, he provides substantial information on the app roach adopted by China’s think tank to balance cybersecurity with strategic necessities as well as the military preparedness China’s rapid technological and economic growth in the last 35 years has made the government put elaborate measures to counter any potential threat to the country’s Critical National Infrastructure Concerning this, the government has taken the responsibility of regulating the country’s internet as well as monitoring information circulating in the country ) ( 3 My paper 100 % Student paper The article also illustrates multiple layers of security that are required not only for cybersecurity but an obligation for public relations. It also provides that there is a need for private companies to support judicial processes aimed at enforcing laws that counter cybercrime. A good example of this is demonstrated by the handling of data in Facebook by Cambridge Analytica . The article talks about multiple l ayers of security needed and just not a mere theatrical façade of cybersecurity as a public relations obligation. Original source The article also illustrates multiple layers of security that are required not only for cybersecurity but an obligation for public relations It also provides that there is a need for private companies to support judicial processes aimed at enforcing laws that counter cybercrime A good example of this is demonstrated by the handling of data in Facebook by Cambridge Analytica The article talks about multiple layers of security needed and just not a mere theatrical façade of cybersecurity as a public relations obligation )
( 3 My paper 100 % Student paper it is not just a mere internet. The author explains that at any given time, either the internet or the telecommunication will lead to huge fi nancial loses for the clients and in some situations, to a given country’s economy. The article has manifested how tools of social media together with the internet have impacted the geopolitical landscape and the even in some cases, a country’s economy. This very interesting article talks about how the internet and social media tools have changed the geopolitical landscape in the best democratic countries as well as toppling dictatorial regimes and staging revolutions in different parts of the world. Original source it is not j ust a mere internet The author explains that at any given time, either the internet or the telecommunication will lead to huge fi nancial loses for the clients and in some situations, to a given country’ s economy The article has manifested how tools of social media together with the internet have impacted the geopolitical landscape and the even in some cases, a country’s economy This very interesting article talks about how the internet and social media tools have changed the geopolitical landscape in the best democratic countries as well as toppling dictatorial regimes and staging revolutions in different parts of the world ) ( 3 My paper 100 % Student paper It is as well very efficient in subduing intruders who are very hostile and whose main aim is to stage a series of attacks on everyday state operations. Göztepe , K., Kılıc , R., & Kayaalp , A. Original source It is as well very efficient in subduing intruders who are very hostile and whose main aim is to stage a series of attacks on everyday state operations Göztepe , K., Kılıc , R., & Kayaalp , A ) ( 3 My paper 100 % Student paper Cyber Defense in Depth: Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering,10(1), 1-3 The authors of this article provided that human beings have resulted to use of mobile devices due to the emergence of mobile devices, a thing that has made them operate in the cyber world, along with the real physical world. With this, attacks on national infrastructure have consequently shifted with this technological growth from being land-based to cyber-attacks. Original source Cyber Defense in Depth Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering,10(1), 1-3 The authors of this article provided that human beings have resulted to use of mobile devices due to the emergence of mobile devices, a thing that has made them operate in the cyber world, along with the real physical world With this, attacks on national infrastructure have consequently shifted with this technological growth from being land-based to cyber-attacks ) ( 3 My paper 100 % Student paper Cyberspace has highly influenced world politics. This article illustrates the importance of investing in cloud infrastructure for cyber spying operations. It has as well-illustrated internet implications and the failures of cybersecurity on the economic, ge opolitical and social aspects of society. Original source Cyberspace has highly influenced world politics This article illustrates the importance of investing in cloud infrastructure for cyber spying operations It has as well-illustrated internet implications and the failures of cybersecurity on the economic, geopolitical and social aspects of society ) ( 3 My paper 100 % Student paper A., Kim, K. H., Janicke , H., Ferrag , M. A., Rallis, S., Fragkou , P., & Cruz, T. Original source A., Kim, K H., Janicke , H., Ferrag , M A., Rallis, S., Fragkou , P., & Cruz, T ) ( 3 My paper 100 % Student paper The article illustrates that this is development is necessitated by cyberspace expansion which is creating a high potential for cyber-attacks. The article is cautioning that cyberattacks might outsmart the government operatives in harming National Infrastructure if sophisticated cyber counter-attack techniques are not adopted by the government. Original source The article illustrates that this is development is necessitated by cyberspace expansion which is creating a high potential for cyber-attacks The article is cautioning that cyberattacks might outsmart the government operatives in harming National Infrastru cture if sophisticated cyber counter-attack techniques are not adopted by the government ) ( 3 My paper 100 % Student paper Cybersecurity of critical infrastructures. CT Express ,4 (1), 42-45. Göztepe , K., Kılıc , R., & Kayaalp , A. Original source Cybersecurity of critical infrastructures CT Express,4(1), 42-45 Göztepe , K., Kılıc , R., & Kayaalp , A ) ( 3 My paper 100 % Student paper Cyber Defense in Depth: Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering,10(1), 1-3 Original source Cyber Defense in Depth Designing Cyber Security Agency Organization for Turkey.Journal of Naval Science and Engineering,10(1), 1-3 )
( 3 My paper 100 % Student paper The article is significant in that it elaborates on the use of Security Concept and Data Acquisition, SCADA in the modern world of the internet, and preventing any new system threats. SCADA has been discussed to contain many security features that can be effectively applied by the defense forces in the protection of National Infrastructure. This applies to both the high-efficiency system’s real-time intrusion and the low efficiencies. Moreover, this article also illust rates on Industrial Control Systems that are effective in the counter-attack missions like energy, manufacturing and communication intrusion. Original source The article is significant in that it elaborates on the use of Security Concept and Data Acquisition, SCADA in the modern world of the internet, and preventing any new system threats SCADA has been discussed to contain many security features that can be effectively applied by the defense forces in the protection of National Infrastructure This applies to both the high-efficiency system’s real-time intrusion and the low efficiencies Moreover, this article also illustrates on Industrial Control Systems that are effective in the counter-attack missions like energy, manufacturing and communication intrus ion ) ( 3 My paper 100 % Student paper The new frontier. Great Decisions, 45-58. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43682574 This article explains that cyberspace is a product of global digital electronic as well as telecommunications; Original source The new frontier Great Decisions, 45-58 Retrieved from http://www.jstor.o rg.gate.lib.buffalo.edu/ stable/43682574 This article explains that cyberspace is a product of global digital electronic as well as telecommunications )
( 3 My paper 100 % Student paper The new frontier. Great Decisions, 45-58. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43682574 Original source The new frontier Great Decisions, 45-58 Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43682574 ) ( 3 My paper 100 % Student paper National Security as a Corporate Social Responsibility: Critical Infrastructure Resilience. Journal of Business Ethics, 103(1), 111-125. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ s table/41476014 Original source National Security as a Corporate Social Responsibility Critical Infrastructure Resilience Journal of Business Ethics, 103(1), 111-125 Retrieved from http://www.jsto r.org.gate.lib.buffalo.edu/ stable/41476014 ) ( 3 My paper 100 % Student paper China’s Perceptions of Cybersecurity. Georgetown Journal of International Affairs, 35-40. Retrieved from http://www.jstor.org.gate.lib.buffalo.edu/ stable/43134336 Original source China’s Perceptions of Cybersecurity Georgetown Journal of International Affairs, 35-40 Retrieved from http://www.jstor.or g.gate.lib.buffalo.edu/ stable/43134336 )
Emerging Threats and Countermeas Assignment