Week 2 Case Study -REVISED.docx - Running Head WEEK 2 CASE...

  • Strayer University
  • SEC 402
  • Essay
  • mackssg
  • 7
  • 50% (2) 1 out of 2 people found this document helpful

This preview shows page 1 - 4 out of 7 pages.

Running Head: WEEK 2 CASE STUDYCase Study 1: The Critical Need for Information SecurityStrayer UniversityAbstract
Case Study 1: The Critical Need for Information SecurityThis paper represents research pertaining to the future of cybersecurity R&D and the agenda for the public and the private sectors. It stratifies the importance of education, cooperation and understanding the economic costs of cybersecurity on the organization and the attacker. The Federal government should take lead on policy and guidance on Information Security issues. Key partnerships with the private sector are instrumental in successful initiatives, planning and implementation of sound systems to include detection and prevention platforms. STEM and computer science educational initiatives help grow the community on bothsides of the fence. It also assures that we have the professionals in our ranks to combat future threats that arise. Collaborations across disciplines help strengthen the overall security framework of each organization.
Case Study 1: The Critical Need for Information SecurityBenefits of using cyber-attack simulator systemsThe first benefit is developing new strategies and platforms to mitigate risk and attacks. These strategies when shared amongst agencies help protect the interests of both the public and private sector. Collaboration warrants new advancements and a commitment to a unified effort. Wired networks are more prevalent than ever growing the attack surface. Modeling simulators such as ARENA were developed by the Rochester Institute of Technology (LeBlanc, Partington, Chapman, and Bernier, 2011). The purpose of ARENA is to model external attacks on a computer networks. The study was partially funded by the Airforce research laboratory. The simulation mimics DDOS attacks and backdoor attacks. The second benefit is furthering the academic and research endeavors. As the results of simulations are published, it further enriches academic programs of study at universities and colleges abroad. Simulation data helps advance the R&D community when prototyping new defenses against known vulnerabilities.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture