Cyber and Physical Security Authors name Institutional Affiliation Cyber and Physical Security Introduction It is with no doubt that the fast and dynamic cybersecurity arena is becoming difficult to keep up with

Cyber and Physical Security Authors name Institutional Affiliation Cyber and Physical Security Introduction It is with no doubt that the fast and dynamic cybersecurity arena is becoming difficult to keep up with. The modern cyber warfare is mainly aimed at disrupting critical infrastructure, for instance, the power grid. In December 2015, Ukraine experienced the impact of cyber-induced blackouts as a result of malicious cyber activity (Wurm, Jin, Liu, Hu, Heffner, Rahman Tehranipoor, 2017). The internet-connected doors and lighting equipment must also be treated as digital assets and secured from hackers. The physical and cyber security should work parallel, for instance, insurance company Aon Plc has its physical and cyber security organizations reporting to a single CSO in order to avert any infiltration by the hackers.
Discussion Protecting critical infrastructure entails partnering with key stakeholders in ensuring adequate management of cybersecurity risks. Department of Homeland Security (DHS) must partner with specific agencies to achieve better cybersecurity through the adoption of best practices, and provision of risk assessment alongside technical offerings(Glantz, Landine, Craig, Bass, 2014). Besides, The DHS must smartly leverage its regulations in tailored ways to prevent cyber security threats from disrupting the provision of vital services to the American citizens. Prevention of the criminal use of cyberspace requires countering sophisticated cybercriminals and transnational criminal organizations. Therefore the DHS is required to continue pursuing, reducing, countering and thwarting illicit cyber activity. This requires collaboration with federal, local, state and international law enforcement bodies. Also, the DHS should focus on investigating financial transactions, computer abuse, cross-border trafficking of illicit materials, misuse of cryptocurrencies and violation of custom laws and thereafter act appropriately (Glantz, Landine, Craig, Bass, 2014). Effective response to cyber incidents is vital in consequence mitigation. The DHS provides technical assistance to assets at risk (asset response) and investigates the underlying crime (threat response). This is achieved by a close link with the federal agencies together with the Department of Justice (Vellaithurai, Srivastava, Zonouz, Berthier, 2015). Voluntary incident reporting plays a huge role in the provision of response assistance by ensuring consistent notification of potential cyber threat thereby helping in countering and disrupting illicit cyber actors. Protection of federal government information systems is vital in reducing vulnerability. DHS works to reduce systemic and organizational vulnerabilities across the federal enterprise (Vellaithurai, Srivastava, Zonouz, Berthier, 2015). This involves the identification of the most critical system and giving priority protection around such systems, for instance, the government emails and military networks. The approach prevents the infiltration of the American cyberspace by the terrorist. Conclusion Safe cyberspace ensures the delivery of essential services to the American people and the functioning of the government. DHS, in collaboration with other federal agencies, stakeholders, and private sector, is aimed at effective management of cybersecurity risk and protection of critical and vulnerable networks. Information sharing, alignment of departmental network protection, incident response, and law enforcement will enhance efforts of DHS in achieving cybersecurity for the future generation.
References Glantz, C. S., Landine, G. P., Craig Jr, P. A., Bass, R. B. (2014). Lessons Learned in Over a Decade of Technical Support for US Nuclear Cyber Security Programmes. InInternational Conference on Nuclear Security Enhancing Global Efforts. Proceedings of the International Conference,17-26 Vellaithurai, C., Srivastava, A., Zonouz, S., Berthier, R. (2015). CPIndex cyber-physical vulnerability assessment for power-grid infrastructures.IEEE Transactions on Smart Grid,6(2), 36-45 Wurm, J., Jin, Y., Liu, Y., Hu, S., Heffner, K., Rahman, F., Tehranipoor, M. (2017). Introduction to cyber-physical system security A cross-layer perspective.IEEE Trans. Multi-Scale Comput. Syst,3(3), 25-31.. CYBER AND PHYSICAL SECURITY PAGE MERGEFORMAT 4 Running head CYBER AND PHYSICAL SECURITY 1 Y, dXiJ(x(I_TS1EZBmU/xYy5g/GMGeD3Vqq8K)fw9
xrxwrTZaGy8IjbRcXI
u3KGnD1NIBs
RuKV.ELM2fiVvlu8zH
(W )6-rCSj id DAIqbJx6kASht(QpmcaSlXP1Mh9MVdDAaVBfJP8AVf 6Q