Cybersecurity: utilizing fusion centers to protect state, local, tribal, and territorial entities against cyber threats
Flynn, Payton A., Sr.
MetadataShow full item record
Many areas of the cyber domain of American citizens are under attack: critical infrastructure, electrical grids, banks, businesses, government, and personally identifiable information (identity theft, medical records, child exploitation, etc.). Although the focus of recent cybersecurity legislation has provided additional authorities to federal agencies, a key concern for state, local, tribal and territorial (SLTT) government entities is this: What is the best way to protect computer networks at the state and local level? State and local governments have the responsibility to protect dams, freeway systems, power and water plants, emergency communications, personal identifiable information, health care records, educational institutions, and banking systems. The array of responsibilities and the cybersecurity threat landscape make state- and local-level computer networks fertile ground for the cyber adversary. This research focuses on the threat to SLTT computer networks and how to leverage information-sharing initiatives, cybersecurity policies and state and local fusion centers to prevent, mitigate, and deter cyber threats targeted at SLTT computer networks.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2007-09);September 2007. Six years after the attacks of 9/11, the practice and discipline of homeland defense and security have evolved and matured, moving into an era of self-evaluation. The essays and articles in Volume III, Issue ...
Developing a reliable methodology for assessing the computer network operations threat of North Korea Brown, Christopher (Monterey, California. Naval Postgraduate School, 2004-09);Computer network operations (CNO) can be considered a relatively new phenomenon being encount modern warfare. Computer network operation is comprised of three components, computer network attack computer network exploitation ...
Critical infrastructure protection : how to assess and provide remedy to vulnerabilities in telecom hotels Ordonez, Michael A. (Monterey, California. Naval Postgraduate School, 2006-09);America's open society includes a vast array of critical infrastructure and key resources that are vulnerable to terrorist attacks. While it is not possible to protect or eliminate vulnerabilities of all critical infrastructures ...