Analyze the types of cyber-attacks


Assignment:

It seems that every day we hear of another cyber-attack on the United States. Some of these attacks are targeting databases of corporations, others are against the government or our critical infrastructure, some are in retaliation and are designed to be destructive, and others are designed to hold information or computers hostage until people or corporations pay ransom to get control of their computers and get their information back. Some of these attacks are by States and others by criminal elements. All of these come under the purview of the Department of Homeland Security.

Prior to posting your initial post go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a "scholarly source" and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources document for guidance. Identify issues that are applicable to cyber security. Please ensure your references are less than 5 years old. Then go to the Department of Homeland Security website to review the Safeguard and Secure Cyberspace mission.

As you analyze the types of cyber-attacks, current science and technology, and the mission of the Department of Homeland Security do you believe the Department of Homeland Security is up to the task of defending and securing the nation's cyberspace? Does the Department of Homeland Security have the tools, tactics, and techniques available to defend and secure the cyberspace? Your initial post must be a minimum of 300 words in length. Support your claims with in-text citations and provide an APA reference list at the end of your post for all your references. Use APA style as outlined in the Ashford Writing Center.

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Analyze the types of cyber-attacks
Reference No:- TGS02962685

Now Priced at $25 (50% Discount)

Recommended (93%)

Rated (4.5/5)