Access over 20 million homework & study documents

Dhs Updated

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/4
Running head: CYBERSECURITY AND COUNTERMEASURES 1
Cyber Security and Countermeasures
Student’s name
Course name
Professor’s name
University affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
CYBERSECURITY AND COUNTERMEASURES 2
Cybersecurity and countermeasures
The normal procedure that DHS should follow after a cyber attack is to perform an
internal investigation that will determine the impact on critical business operations. This is a
critical step in identifying the attacker, finding out about the security vulnerabilities and
emergency improvements that need to be made on the computer systems (Shackelford, 2014).
Since the coordinated attacks have paralyzed many businesses the DHS needs to remain calm
and call for an emergency meeting. The agencies affected by the tampering campaign will be
notified immediately on the extent of the damage based on the available information that they
have collected. All the government heads in charge of the security should be available including
the affected companies. The heads of the affected agencies like the defense department, electric
grid infrastructure, public and financial institutions, and the IT department will be notified about
the attacks to establish the threats and damages posed by the coordinated cyber attack from
China. The DHS will then give a way forward to the affected agencies on how the damage will
be limited for instance rerouting the network traffic, blocking traffic or isolation of the
compromised networks. The public will then be warned against accessing certain sites that are
deemed malicious to the general public.
The security team at the DHS will keep a written log of the actions taken to respond to
the breach. The records would normally consist of disrupted services, affected systems, amount
and type of damage, data and networks affected (Shackelford, 2014). The agencies need to
corporate with the law enforcers to before notifying the affected clients to avoid compromising
with the investigations. The incident response team from the DHS may be deployed to assess the
situation on the companies that have been attacked (Dawson & Omar, 2015). The whole process
will need to be documented to advise the agencies on what they need to do to handle any future

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: CYBERSECURITY AND COUNTERMEASURES Cyber Security and Countermeasures Student’s name Course name Professor’s name University affiliation Date 1 CYBERSECURITY AND COUNTERMEASURES 2 Cybersecurity and countermeasures The normal procedure that DHS should follow after a cyber attack is to perform an internal investigation that will determine the impact on critical business operations. This is a critical step in identifying the attacker, finding out about the security vulnerabilities and emergency improvements that need to be made on the computer systems (Shackelford, 2014). Since the coordinated attacks have paralyzed many businesses the DHS needs to remain calm and call for an emergency meeting. The agencies affected by the tampering campaign will be notified immediately on the extent of the damage based on the available information that they have collected. All the government heads in charge of the security should be available including the affected companies. The heads of the affected agencies like the defense department, electric grid infrastructure, public and financial institutions, and the IT department will be notified about the attacks to establish the th ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents