Question

Do you believe that homeland security can protect us from cyber crimes? If so, provide an...

Do you believe that homeland security can protect us from cyber crimes? If so, provide an example. If not, explain why you feel this way.  

please give me unique answer

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.

Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.

On May 16.2018, the Department of Homeland Security released a strategy to provide the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.

Here is the link to the Strategy: https://www.dhs.gov/sites/default/files/publications/DHS-Cybersecurity-Strategy_1.pdf

Here is a description of the new technologies in the new DHS policies:

Socrates

This software platform automatically seeks patterns in data sets, and can tease out those that represent cyber threats. It tries to provide both analysis and computer science capabilities, a pairing that human analysts often lack.

The platform can perform unsupervised analysis of data – seeking patterns that may reveal future outcomes. Socrates has been used to study travel patterns of large groups to discover unknown associates of persons of interest, for example.

PcapDB

This is a software database system that captures packets to analyze network traffic by first organizing packet traffic into flows.

Its creators liken its function to that of the black box flight recorders on airplanes. “Pcap allows reconstruction of malware transfers, downloads, command and control messages, and exfiltrated data,” they say.

The platform optimizes the data captured so it can be stored on less disk space and accessed more quickly for analysis. By stripping away unnecessary features, PcaDBcan store months of traffic data on commodity Serial Attached SCSI (SAS) disks, a plus when investigating intrusions. “The longest history possible is key when investigating a cyber incident,” its creators write.

REDUCE

This is a software analysis tool to reveal relationships between malware samples and to develop signatures that can be used to identify threats.

The software performs static analysis on malware samples to identify similar code sections that link the samples to previously analyzed malware groups. This enables rapid inferences about who wrote the new malware and what its technical characteristics might be.

Unlike some commercial tools that compare two malware samples at a time, REDUCE can compare multiple samples simultaneously. When it discovers similarities in code patterns it displays them along with existing knowledge about those patterns.

The tool is designed for use by security practitioners who don’t have a lot of reverse engineering background.

Dynamic Flow Isolation

DFI leverages software defined networking to apply security policies on-demand based on current operational state or business needs.

This is done by enabling, disabling or rate limiting communications between individual users and network services. This can be done either automatically or manually.

The software gains awareness of the network’s operational state by integrating with devices such as authentication servers and intrusion detection systems. It also integrates with SDN controllers to change allowable network connections in response to changing network state. This enables quarantining of individual machines or groups and blocking active attacks from reaching critical assets.

The software includes a policy enforcement kernel implemented within SDN controllers to update access rules for switches in the network. It works with existing SDN hardware and is portable across SDN controllers.

TRACER

Timely Randomization Applied to Commodity Executables at Runtime (TRACER) is a means to alter the internal layout and data of closed-source Windows applications such as Adobe Reader, Internet Explorer, Java and Flash.

Because these applications are closed and have static data and internal layout, adversaries can craft attacks that can be effective on a large scale.

By randomizing the sensitive internal data and layout every time there is an output from the application, attackers can’t prepare effective attacks against them. Even if information about the data and layout leak during one output, the arrangement will be different the next time.

In this way TRACER can thwart control-hijacking attacks against these Windows applications. It is installed on each machine and doesn’t interfere with normal operation. The downside is it increases execution time by 12% on average.

Other randomization schemes such as Address Space Layout Randomization, compiler-based code randomization and instruction set randomization perform one-time randomization. Patient attackers can wait for data leakage from the applications to create effective attacks.

FLOWER

Network FLOW AnalyzER inspects IP packet headers to gather data about bi-directional flows that can be used to identify baseline traffic and abnormal flows as a way to spot potential breaches and insider threats.

The data, collected via small appliances throughout the network and at its perimeter, can also be used as a resource for forensic investigations into incidents.

FLOWER has been deployed in more than 100 government and business networks since 2010. It has detected and mitigated coordinated attacks and used to create attack signatures.

SilentAlarm

This platform analyzes network behaviors to identify likely malicious behavior to stop attacks including zero-days for which there are no signatures.

Network events are fed to its analysis engine from existing sensors. The engine incudes knowledge nodes, analysis segments tuned to certain types of network behaviors such as failed or successful SMTP attempts or failed Internet connections. Based on historical behavior, each new event is characterized as normal or abnormal.

These characterizations are fed to hypothesis nodes that conclude whether observed behavior indicates malicious activity. If malicious activity is spotted SilentAlarm can send an alert or intervene.

Add a comment
Know the answer?
Add Answer to:
Do you believe that homeland security can protect us from cyber crimes? If so, provide an...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Research modern cyber requirements and share with the class how they differ from traditional enterprise security...

    Research modern cyber requirements and share with the class how they differ from traditional enterprise security requirements. How do these requirements affect the way an organization might want to protect its data? Provide a real-life example of a cybersecurity failure.

  • ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE...

    ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC IS "DATABASE AND DATA CENTER SECURITY" In Database and Data Center Security. What is Piggybacking attack? A) Give real life example? B) Give one SQL code example of Piggybacking attack? C) How do you minimize the chances of this attack? Le Q4 Then there isa Piggyback attack a 4 Select the record of the studen whase, name is Robert close...

  • Computer Security: Give three reasons why computer crime is so hard to prosecute and provide an...

    Computer Security: Give three reasons why computer crime is so hard to prosecute and provide an explanation of each of them. Give at least one example of the difference in cyber law between the United States and Europe. Also give one example of how this has already created a problem for the United States (or how it could lead to problems in the future).

  • Give your opinion on what you believe to be the greatest IT security concern facing businesses...

    Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case. Additionally, propose at least one security control that a business could consider implementing in order to protect against the IT security concern in question. Read the article titled "10 security best practice guidelines for consumers". Next, identify the security practice guideline that you believe consumers should. educate themselves with the most...

  • ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE...

    ALL THE QUESTIONS BELOW ARE BASED ON CYBER SECURITY COURSE. SO PLEASE ASN THE QUESTION. THE NAME OF THE TOPIC "DENIAL OF SERVICE ATTACKS" À chat Denial of surface menu 2) What is Denial of Service es =) wheet us Destrubutine Denial of seruisce. Q2 Describe the Tcp sin cetrack, 23 Describe the UDP fludding attach. Qy Describe the DNS Carruption attack. clore How. Do you reduce the St. Risk of A TEP Sin attack. Os How Do you menimize...

  • I have an assignemnt of cyber security. you "own words" and can also provide where I...

    I have an assignemnt of cyber security. you "own words" and can also provide where I can  study more of the subject. is a case study and I need to use it to present. I have a pessage below and then 1 question. my role is more of cyber threat analyst Espionage A former senior financial analyst was arrested as they were boarding a flight for Switzerland carrying a large amount of sensitive customer data of high profile clients. Computers searched...

  • How can you protect your IT product or service idea? What are the consequences if you...

    How can you protect your IT product or service idea? What are the consequences if you do not take the legal procedure required to protect your IT product or service idea? Search and discuss if there is any difference between IT products and other products in terms of legal protection issues. It is a general rule that you should cite your reference sources when you are borrowing ideas from other authors. Why is this important and what are the consequences...

  • Do you think of any facility that did not do enough to protect its workers from...

    Do you think of any facility that did not do enough to protect its workers from chemical or biological hazards? why or why not? if you feel that the facility does or did enough, discuss the protection that are or were employed? if you feel that the facility does not or did not do enough, how could they improve their protection strategy?

  • Chapter 11 discusses ethical leadership. Do you believe that one can be an ethical leader and...

    Chapter 11 discusses ethical leadership. Do you believe that one can be an ethical leader and maximize shareholder value? Explain your answer and give an example of a company that demonstrates your point of view.

  • 1. Do you believe that business cycles are related to political elections? Explain your thoughts why...

    1. Do you believe that business cycles are related to political elections? Explain your thoughts why or why not. 2. What do choose from the three approaches described in this chapter, as the best choice in dealing with the current economic challenges. 3. Do you believe that developed, industrial countries have an obligation to provide foreign aid to developing countries? Explain your answer. 4. There were several major international financial crises in the 1990s as well as in 2007-2008. What...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT