Homeland Security Risks

Homeland Security Risks


Homeland Security Use the US-CERT and other similar resources to discuss the
vulnerabilities and exploits that might have been used by the attackers. Explore the
resources for risk mitigation and provide the risk, response, and risk mitigation steps
that should be taken if an entity suffers the same type of attack.
US critical infrastructure-power—water, oil and natural gas, military systems,
financial systems—have become the target of cyber and physical attacks as more
critical infrastructure systems are integrated with the Internet and other digital
controls systems. The lesson learned in defending and mitigating cyberattacks is that
no entity can prevent or resolve cyberattacks on its own. Collaboration and
information sharing is key for success and survival.
This is a group exercise, representing collaboration across all sectors, to support and
defend US critical infrastructure. In the working world, a team like this would include
some agencies, some industrial partners, and some private sector corporations.
Each organization has different strengths and skills, different access to information,
and different authorities to report to. When the sectors work together and leverage
resources and skills, the result is that everyone benefits from the defense and
protection of US IT infrastructure. In your teams, you can model the same
collaboration, leveraging each other's expertise, sharing each other's knowledge,
teaching each other, and providing contributions specific to your role in the scenario.
Provide an overview of the life cycle of a cyber threat. Explain the different threat
vectors that cyber actors use, and provide a possible list of nation-state actors that
have targeted the US financial services industry before.
Review this threat response and recovery resource and use what you learned from
the resource to provide or propose an analytical method in which you are able to
detect the threat, identify the threat, and perform threat response and recovery.
Identify the stage of the cyber threat life cycle where you would observe different
threat behaviors. Include ways to defend against the threat, and protect against the
Intelligence Community Provide intelligence on the nation-state actor, their cyber
tools, techniques, and procedures. Leverage available threat reporting such as from
FireEye, Mandiant, and other companies and government entities that provide
intelligence reports. Also include the social engineering methods used by the nation-
state actor and their reasons for attacking US critical infrastructure.


Answer Preview…………..

 Security threats facing United States can either be described as either domestic or international.  Domestic threat occurs as a result as unlawful use or threatened use of violence by either an individual or particular group of people purely operating within the United States without any foreign aid. On the other hand, international threats are dangerous at that violate the law and poses significant threat to human life or property committed with the aid of another country. These acts are aimed at coercing American citizens or coerce any government policy or impact how the government of the United States operates (Alperen, 2011).  Security threats that faced by United States can be classified as either physical or cyber threats. Physical security threats are crimes that aim at sabotaging or damaging equipment, installations materials or even killing human beings.  On the other hand cyber-attacks are criminal acts that re conducted through internet systems…………

APA 1817 words

Share this paper
Open Whatsapp chat
Can we help you?