Coast Guard Cyber Security Analysis

Great Essays
Intro, Importance, and Summary
(U) In 2015, the United States Government suffered the biggest cyber-attack against a federal agency to date. The Office of Personnel Management reported that up to 21.5 million instances of personal data was stolen by hackers. Many more attacks have occurred recently, and cyber-attacks have become a common occurrence with billions of attacks carried out on various federal agencies each year. Pew Research Center recently conducted a study, and found that the people of the United States believe that the second biggest threat to global security is cyber-attacks. Specifically, these threats pose significant risks to the Coast Guard and the National Maritime System (NMS). These operations contain cyber systems crucial
…show more content…
Many of these systems are on helicopters, cutters, boats, and operational settings across the country. If attacks are successful, the missions fail, and rebuilding is necessary, costing countless resources, time, and possibly civilian lives. Furthermore, strikes on these systems could lead to the death or injury of members in the Coast Guard or NMS, equipment damage, or economic damage. Therefore, the Coast Guard intelligence requirement of cyber-security and cyber operations is crucial to the Coast Guard’s survival. Only one opening in a cyber system can lead to a failure, making it crucial to secure these systems. The Coast Guard can combat cyber-attacks by consistently monitoring and updating their cyber systems, figuring out which systems will be under attack the most, learning from other organizations successes and failures, and knowing how to react when under attack. Overall, the Coast Guard needs to defend their cyberspace, allowing them to enable their operations across the globe and protect the affairs of other organizations while protecting the valuable …show more content…
The amount of skill combined with the amount of money and resources available to cyber adversaries determines how successful they are. Cyber adversaries use many different techniques. These could include uploading malicious software to a system, instigating a Denial of Service attack, where hackers overwhelm a server with a massive amount of traffic in order to destroy a system, utilizing social engineering and phishing attacks, employing other various attacks involving data manipulation and brute force to open a system. Time, money, people, and skills all limit cyber adversaries against carrying out attacks. The risk involved with this is that a cyber adversary is only as strong the government’s weakest system. If the government has well-built systems that can withstand daily attacks, the enemy cannot perform what they aim to complete. This is why it is important for the government and the Coast Guard to have access to the most skilled people, and utilize the best cyber defense machines and techniques. Furthermore, the diffusion of this technology to the NMS and other businesses is important. The civilian sector needs to be able to protect itself in order to secure economic safety for the United

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government. The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Serves as the Lead Business Authority for the Domain Awareness Network portfolios. Leads the evaluation of emerging sensor technologies to meet future DHS mission requirements. Incumbent identifies and assesses the applicability of sensor technologies that identify and track suspected illicit activity and to increase the DHS’s Domain Awareness Portfolio. Recommends pertinent intelligence data, operational reporting, messages, and maritime and aircraft tracking data key that are key enablers to the DHS…

    • 504 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    During a security breach that may occur a logging system will allow Plankton to be notified of any negative events that may occur. This can enable the business to gain notification of what is happening within the network such as data being extracted or failures such as power failure or fault within hardware. This would enable the business to track the route cause of the threat. To enable this, being able to assess the environment of the business is essential, such as the assets that need to be monitored and therefore configure notifications and alerts on those assets. (Security Compass, 2018)…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Expeditionary Force 21 (EF21) “provides guidance for how the Marine Corps Total Force – as an integral part of the lager naval and joint team – will be postured, organized, trained, and equipped to fulfill assigned public law and national policy responsibilities.” (Expeditionary Force 21 Capstone Concept p. 5). Expeditionary Force 21 is essentially the Marine Corps 10 year vision and action plan. According Week 1’s video presentation, EF21 seeks to: establish a forward presence of one-third of U.S. Marine Corps operational forces; establish regionally oriented units connected and integrated with theater staff; maintain modular forces capable of being tailored respective to the mission and requirement; possess a standing headquarters capable…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hurricane Response Paper

    • 534 Words
    • 3 Pages

    Being in the Coast Guard at a Maritime Safety and Security Teams (MSST) we provide rapidly deployable specialized waterborne and shore side antiterrorism forces for critical maritime infrastructure and strategic maritime shipping throughout the ports of the United States and ports of interest abroad. The current utilization of MSSTs represents an unbalanced equation of risk versus mission accomplishment. We are reserved to function as a contingency response asset for significant national or regional maritime. We routinely conduct full-scale training and exercises on a host of terrorist response scenarios, which allows us to react with a degree of familiarity in the event of terrorist…

    • 534 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    While on the other hand, the responsibility for securing the homeland against maritime threats brings significant challenges across different entities’ efforts (2014). The two organizations that contributed the most in maritime security are the Department of Defense (U.S. Navy) and the Department of Homeland Security (U. S. Coast Guard) (2014). Challenges they faced escalates due to the numerous unguarded coastlines around the United States. In 2005, the National Strategy for Maritime Security confronted the challenges by providing a Maritime Operational Threat Response Plan (MOTR) on how to respond to maritime threats (2014). Maritime security calls for a synchronized inter-agency response to real-time emergent threats in which the MOTR has proven to be effective…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Resiliency has been on the foregrounds of homeland security and emergency management procedures since the beginning of the century, particularly after the attacks of 9/11 and other disasters, such as natural disasters caused by hurricanes. The ability to withstand such disasters and recover swiftly is very important and must always be considered. Furthermore, it is also important to identify required components of the strategy and the resiliency of those components. The maritime security strategy has been built upon the ability to establish maritime domain awareness, both in U.S. waters and overseas as vessels are transiting to and from domestic seaports. This research has identified the requirements for MDA and its inherent vulnerability due to over rebalance on…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays