Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information

Cybersecurity: Continued Federal Efforts are Needed to Protect Critical Systems and Information
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 24
Release: 2009-12
Genre: Computers
ISBN: 1437918506

Federal laws and policy have assigned important roles and responsibilities to the Dept. of Homeland Security (DHS) and the Nat. Inst. of Standards and Tech. (NIST) for securing computer networks and systems. DHS is charged with coordinating the protection of computer-reliant critical infrastructure -- much of which is owned by the private sector -- and securing its own computer systems, while NIST is responsible for developing standards and guidelines for implementing security controls over information and information systems. This report describes cybersecurity efforts at DHS and NIST -- including partnership activities with the private sector -- and the use of cybersecurity performance metrics in the fed. gov¿t. Table and graphs.

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 24
Release: 2010-11
Genre: Computers
ISBN: 1437925650

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.

Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering
Author: John M. Borky
Publisher: Springer
Total Pages: 788
Release: 2018-09-08
Genre: Technology & Engineering
ISBN: 3319956698

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.

Critical Infrastructure Protection

Critical Infrastructure Protection
Author: Stephen L. Caldwell
Publisher: DIANE Publishing
Total Pages: 48
Release: 2011-02
Genre: Health & Fitness
ISBN: 1437931839

According to the Dept. of Homeland Security (DHS), there are thousands of facilities in the U.S. that if destroyed by a disaster could cause casualties, econ. losses, or disruptions to national security. DHS issued the Nat. Infrastructure Protection Plan (NIPP) in June 2006 to provide the approach for integrating the nation's critical infrastructure and key resources. This report studied DHS's Jan. 2009 revisions to the NIPP in light of a debate over whether DHS has emphasized protection rather than resilience. The report discusses: (1) how the 2009 NIPP changed compared to the 2006 NIPP; and (2) how DHS addressed resiliency as part of their planning efforts. Charts and tables. This is a print on demand edition of an important, hard-to-find report.

Defense Critical Infrastructure

Defense Critical Infrastructure
Author: Davi M. D'Agostino
Publisher: DIANE Publishing
Total Pages: 91
Release: 2011
Genre: Technology & Engineering
ISBN: 143792459X

This is a print on demand edition of a hard to find publication. DoD relies overwhelmingly on commercial electrical power grids for secure, uninterrupted electrical power supplies to support its critical assets and is the single largest consumer of energy in the U.S. In 2008, it was reported that "[c]ritical national security and homeland defense missions are at an unacceptably high risk of extended outage from failure of the grid". Commercial electrical power grids have become increasingly fragile and vulnerable to extended disruptions that could severely impact DoD's critical assets. This report addresses these issues and argues that with more detailed knowledge of the assets' risks and vulnerabilities to electrical power disruptions, DoD can better avoid compromising crucial DoD-wide missions during electrical power disruptions.

Information Security

Information Security
Author: Gregory C. Wilshusen
Publisher: DIANE Publishing
Total Pages: 66
Release: 2009-11
Genre: Computers
ISBN: 1437919383

Weaknesses in info. security (IS) are a widespread problem that can have serious consequences -- such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable info. -- and has identified IS as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. IS Mgmt. Act of 2002 (FISMA), which authorized and strengthened IS program, evaluation, and reporting requirements for fed. agencies. This report evaluates: (1) the adequacy and effectiveness of agencies' IS policies and practices; and (2) fed. agencies' implementation of FISMA requirements. Includes recommendations. Illustrations.

Electricity Grid Modernization

Electricity Grid Modernization
Author: David A. Powner
Publisher: DIANE Publishing
Total Pages: 50
Release: 2011-05
Genre: Technology & Engineering
ISBN: 1437944965

The electric industry is increasingly incorporating IT systems into its operations to improve reliability and efficiency. If these efforts are not implemented securely, the electric grid could become more vulnerable to attacks and loss of services. To address this concern, the NIST and FERC were given responsibility for coordinating the development and adoption of smart grid guidelines and standards. This report: (1) assesses the extent to which NIST has developed smart grid cybersecurity guidelines; (2) evaluates FERC¿s approach for adopting and monitoring smart grid cybersecurity and other standards; and (3) identifies challenges associated with smart grid cybersecurity. Charts and tables. This is a print on demand report.

Foundations of Homeland Security

Foundations of Homeland Security
Author: Martin J. Alperen
Publisher: John Wiley & Sons
Total Pages: 561
Release: 2011-03-08
Genre: Political Science
ISBN: 0470934603

This book is the complete guide to understanding the structure of homeland security – its underlying law and policy. Created from a broad and in depth, yet edited collection of statutes, policy papers, presidential directives, and other documents, it cultivates a detailed understanding of the foundations of homeland security. It is arranged in a topic-by-topic format structured to include only the documents and statues that affect a particular subject, making for much easier understanding. Thus, the chapter on FEMA contains only the portions of the statutes and other documents that relate to FEMA. There are twenty-five topic areas. It contains hundreds of end notes, references, and suggestions for further study. This book offers important legal guidance that students, law enforcement officers, lawyers, and other homeland security professionals need to accurately interpret, understand, and apply homeland security policy. The Introduction provides an in-depth overview of the subject of homeland security and includes a discussion of what is homeland security, definitions of homeland security and terrorism, what is homeland security law, its development, and what is a homeland security curriculum. There are contributing chapters about homeland security in Europe, and homeland security in China and Japan.