PROTECTINGOURFUTURE,SERIESINCYBERSECURITY Editor,JaneLeClair ProtectingOurFuture:EducatingaCybersecurityWorkforceVol.1 Examines7ofthe16HomelandSecurityCritical InfrastructureSectors,inadditiontootherworkforceneeds. EditedbyJaneLeClair CybersecurityinOurDigitalLives Looksatevolvingoperationalneedsinareasthataffectourdailydigitallives. EditedbyJaneLeClairandGregoryKeeley ProtectingOurFuture:EducatingaCybersecurityWorkforce,Vol.2 Examines9ofthe16 HomelandSecurityCriticalInfrastructureSectors. EditedbyJaneLeClair ABOUTHUDSONWHITMAN Hudson Whitman is a small press affiliated with Excelsior College, a non-profit, online collegeservingprimarilyadultstudents. OurtaglineisBooksThatMakeaDifference,andweaimtopublishhigh-quality nonfictionbooksandmultimediaprojectsinareasthatcomplementExcelsiorsacademic strengths:education,nursing,healthcare,militaryinterests,cybersecurity,andforspecial projectsthatmaynoteasilyfitinonecategory,Americancultureandsociety. Ifyouwouldliketosubmitamanuscriptorproposal,pleasereviewtheguidelineson ourwebsite,hudsonwhitman.com.Feelfreetosendanotewithanyquestions.
OTHERTITLESBYHUDSONWHITMAN TheCallofNursing:StoriesfromtheFrontLinesofHealthCare WilliamB.Patrick(printande-book) Shot:StayingAlivewithDiabetes AmyF.Ryan(print+e) TheSanctuaryofIllness:AMemoirofHeartDisease ThomasLarson(print+e) TheLanguageofMen:AMemoir AnthonyDAries(print+e) CourageousLearning:FindingaNewPaththroughHigherEducation JohnEbersoleandWilliamPatrick(print+e) SavingTroy:AYearwithFirefightersandParamedicsinaBatteredCity WilliamPatrick(e-bookonly) ProtectingOurFuture:EducatingaCybersecurityWorkforce(Vol1) EditedbyJaneLeClair(print+e) N21NursingintheTwenty-FirstCentury Afree,peer-reviewedmobilejournalavailableontheweborasaniOSapp. Signupforourmonthlye-newsletterfordeals,events,newreleases! hudsonwhitman.com Contents Acknowledgments Writingabookaboutatopicthatoneenjoysisalwaysapleasure,butitisneverwrittenin avacuum.Therearealwayscountlessindividualswhocontributetheirtimeandtalentsto makingsureitreachesthefinishline.GregandIwouldliketothankeveryonewhohelped ustoaccomplishthiswork.Naturally,wewishtothanktheauthorsofthevariouschapters for their participation, hard work, and diligence in providing their valuable insights. Without question, the information they have provided will go a long way to helping the readerbetterunderstandthemultipleissuesinvolvedincybersecurity.HudsonWhitman/ ExcelsiorCollegePress,inparticularSusanPetrie,shouldbethankedforvaluableinputs to the final product. The support staff at our National Cybersecurity Institute (NCI) has beenessentialincompletingthiswork.And,asalways,Dr.JohnEbersole,thepresidentof Excelsior College, must be thanked for his ongoing support of the NCI, and for his encouragementofourefforts.Finally,wewishtoextendourappreciationtoformerU.S. Attorney General John Ashcroft for taking time from his busy schedule to write the foreword.Itisdeeplyappreciated. Foreword AsU.S.AttorneyGeneral,Iwitnessedfirst-handtheconsequencesofbeingunpreparedto defend against attacksbe they attacks of rogue states or commercial criminals.
The cyberthreatstoournationalsecuritygrowdaybyday. Whether cyber attacks are launched to gain a marketplace edge or to impair the securityoftheUnitedStates,theirimpactsalwaysreverberatebroadly.Thepervasiveuse of information technology in the digital age has fostered unparalleled productivity. Unfortunately, it has also exposed new avenues for espionage and disruptive malicious acts. While systems, tools, and rules can help build a bubble of defense against cyber attack,thedeploymentofthesemeasuresisoftentoolate.Intheend,themostimportant resources for threat prevention and attack mitigation are found in the preparedness of trainedprofessionals.Thisbookexamineshowindividualsandorganizationscanbebetter prepared. Industry and governments have developed a wide variety of measures to evaluate disparate risks to their cyber infrastructure. As a result, they can estimate various risks.
However, bad actors massage the data and develop strategies to penetrate existing defenses. There are those who see cybersecurity as simply the new technology buzz word. However, as major breaches of the government health care system, Veterans Affairs, Gmail,andmajorretailersattest,thenegativeimpactsoncompromisedsystemsaremost serious and significantly damaging. The National Cybersecurity Institute (NCI) at ExcelsiorCollegehasconsideredtheseissuesandthechallengeswefaceasanation.The NCIhasassembledavaluablesetoftoolstohelpstudents,government,andcommercial enterprisesbothunderstandandaddresstheseriousthreattoourcybersecurity. JohnAshcroft 79thU.S.AttorneyGeneral Introduction JANELECLAIR and GREGORYKEELEY We are a connected people. Daily, our dependence on computers, mobile devices, and digital systems increases for business, personal transactions, social media, education, entertainment,communication,andahostofotherpurposes,somevitaltoourwellbeing and some insignificant and perhaps frivolous.
We are a connected societya digital peoplewithourfameandfortuneaclickawayontheInternet.Withsomuchofourdaily lifedependentondigitalsystems,weneedtoinsurethatourdependenceonthosesystems is secure and safe from mischief. Despite our reliance on information technology, most people are nave as to the threats and the security required to combat malicious actions. Peoplehaveplacedtheirdigitalsecurityinthehandsofothersandinmanyrespectshave relinquishedcontroloftheirpersonalandcommercialdataandinformation. Cybersecurity,simplystated,istheprocessbywhichweguardourdataatanylevel personal,organizational,orgovernmentalinformationinthedigitalworld.Information datais valuable not only to us personally, but to our national interest. Our personal computersandmobiledevicesarebeingassaultedbyviruses,thedigitalnetworksofthe banking systems are attacked regularly, and every minute of every day those with malicious intent attempt to breach the cyber defenses of our government agencies. Bad actors, both state and criminal, seek to steal our personal information from social media outlets, gain access to financial information through social engineering, and harm businessesfromtheinside.Cybersecurityseekstoguardagainstsuchintrusionsaswellas losses.
Cybersecurity continues to be one of the most important issues confronting the connected planet. If we recognize the value and importance of information in the digital age,thenitisessentialtoappreciatejusthowcrucialcybersecurityistousasindividuals, organizations, and most crucially to the sectors we highlight in this book. The globe is nowlinkedinwaysunimaginablelittlemorethanadecadeago.Wearesharingenormous amounts of information and data sometimes willingly, but often times unwittingly. We operate in a knowledge economy where information and the exploitation of that information are incredibly valuable. Nefarious actors, be they state or criminal, strive to access commercial information for competitive advantage, personal data which is exchanged and exploited by criminals for financial gain, and of course government databasesaffectingeverythingfromhealthcaretonationaldefense. Whileweliketobelievethatourdataissecure,rarelyadaypasseswithoutnewsofa major cybersecurity breach.
Seemingly cuttingedge organizations such as Target, Home Depot, Amazon, Pinterest, Tumblr, Airbnb, Facebook, Google, Twitter, Adobe, the WashingtonStateCourts,andJ.P.Morganhaveallbeencompromised.Thenewnational health care system, the national power grid, numerous government agencies, schools, social media, the defense industry, and financial institutions have all been assaulted by those with malicious intent (Marks, 2014). Sensitive data has been lost, businesses compromised, personal lives exposed, credit card numbers stolen, and health and well beingendangeredthroughthreatstoourmajornetworksandinfrastructures. Wehavegainedmuchthroughtechnology;wenowhavetheabilityto:transmithuge amounts of data over the Internet, complete limitless electronic transactions on a daily basis, and compile increasingly large amounts of sensitive information for our business organizations. Some estimate that each day nearly three quintillion bytes of data are generated online. Digital technology has given us the ability to utilize social media and chatwithourfriends,shoponline,readmagazines,enjoythenews,monitorourfinances, and secure our homes. We spend billions of dollars online each year and send countless tweetsande-mails.Theconvenienceandadvanceshavecomewithaheftypricesecurity (Indvik,2013).
Next page