State methods for a cyber incident
dc.contributor.advisor | Bergin, Richard | |
dc.contributor.advisor | Lewis, Ted | |
dc.contributor.author | Mulligan, Michael R. | |
dc.contributor.department | National Security Affairs | |
dc.date | March 2012 | |
dc.date.accessioned | 2013-07-03T20:17:47Z | |
dc.date.available | 2013-07-03T20:17:47Z | |
dc.date.issued | 2012-03 | |
dc.description.abstract | The National Cyber Incident Response Plan stipulates the state homeland security advisor as the contact point for a significant cyber incident. But this may not be the most effective method of response because the state homeland security advisors are not domain experts for cyberspace. A questionnaire was sent to state chief information officers and/or state chief information security officers to determine current capability and procedures for responding to a national cybersecurity incident. Nineteen states replied with 227 responses relating to information sharing between states and the federal government; use of established cybersecurity event and response definitions, coordination and control mechanisms, and terms; use of risk-based approaches to cyber incident planning, including remediation based on workflows and procedures; establishment of thresholds when predefined boundaries are crossed; and instigation of varying courses of action. As a result of the survey, the author recommends increasing knowledge and information flow between state and federal agencies regarding national cyber incidents; the establishment of regional cybersecurity hubs throughout the nation; and the creation of a national cyber incident teleconferencing network and prearranged protocols for situational awareness and communication of courses of action following a cybersecurity incident. | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. | |
dc.description.service | Director Operations and Planning, DHS Office of Cybersecurity and Communications | en_US |
dc.description.uri | http://archive.org/details/statemethodsforc1094534237 | |
dc.format.extent | xx, 125 p. :|bill. ;|c28 cm. | en_US |
dc.identifier.uri | https://hdl.handle.net/10945/34237 | |
dc.publisher | Monterey California. Naval Postgraduate School | en_US |
dc.rights | Copyright is reserved by the copyright owner. | en_US |
dc.subject.author | Cyber Incident Response Plan | en_US |
dc.subject.author | State Information Security Officer | en_US |
dc.subject.author | Cyberspace | en_US |
dc.subject.author | Cybersecurity | en_US |
dc.subject.author | Department of Homeland Security Office of Cybersecurity and Communications | en_US |
dc.subject.author | National Cybersecurity and Communications Integration Center | en_US |
dc.title | State methods for a cyber incident | en_US |
dc.type | Thesis | en_US |
dspace.entity.type | Publication | |
etd.thesisdegree.discipline | Homeland Security and Defense | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.name | Master of Arts in Security Studies (Homeland Security and Defense) | en_US |