Continuity Of Operations And Cyber Warfare

Read Complete Research Material

CONTINUITY OF OPERATIONS AND CYBER WARFARE

Continuity of Operations and Cyber Warfare

Abstract

Organizations that conduct risk management are better prepared to deal with, and recover from, the impacts to their mission objectives resulting from information incidents. The complexity and distributed workflow process of organizations makes the adoption of risk management and assessment extremely challenging. The nature of this new organizational environment extends to the dynamic and decentralized nature of military operations and has prevented the direct adoption of a standardized, centralized risk management process.

Continuity of Operations and Cyber Warfare

Introduction

The high accessibility of Internet-based, low-cost cyber-weapons that can target citizen data assets is a growing threat to the economic steadiness of modern societies that depend on today's data infrastructures. Asurvey of Fortune 1000 businesses found an annual 64 percent development rate in cyber-attacks being carried out through the internet. Because some organizations do not traditionally include the defense of commercially operated infrastructures, business managers should accept this responsibility and plan to defend themselves against these growing threats. Despite the expanding information warfare threat, business managers often do not realise or take the activities required to supply appropriate data security.

In a 2004 review, 874 Certified data scheme Security Professionals (CISSPs) graded top administration support as the most critical information security topic facing associations today. It even outranked other significant security matters such as malware (malicious software), spam, patch administration, business continuity, and mesh security anxieties considering firewalls and intrusion detection

Problem Statement

This thesis seeks to improve mission assurance by developing a clear understanding of the concept of mission and mission assurance and by conducting an analysis of existing continuity of operations components within the organizations and improving the timeliness and relevance of a cyber incident.

Research Project

Information warfare is a relatively new area of anxiety and study, the late Dr. Thomas Rona allegedly coined the term data warfare in 1976. Since then, numerous data warfare delineations have emphasized the military dimension. The seven categories of information warfare that is replete with military terminology: command and control warfare, intelligence-based warfare, electronic warfare, psychological warfare, hacker warfare, economic information warfare, and cyber-warfare. Today, we use the terms information war and cyber-war to explore a range of conflict types covering political, economic, criminal, security, civilian, and military dimensions (Cerullo, 2004). Poorly defended government and financial computer systems were susceptible to an electrical devices pearl harbor. Others describe information warfare as the activities proposed to protect, exploit, corrupt, ...
Related Ads
  • Cyber Warfare
    www.researchomatic.com...

    Cyberwarfare is Internet-based conflict invol ...

  • Cyber Warfare
    www.researchomatic.com...

    Cyber war , consists of units organized nation ...

  • Cyber War
    www.researchomatic.com...

    She became so important to military operations ...

  • Information Warfare: Prin...
    www.researchomatic.com...

    Information Warfare: Principles And Operations, Info ...