SlideShare a Scribd company logo
1 of 5
discuss how the types of threats discussed in the article referenced above
could impact our economy and how implementing diversity and
commonality could help mitigate these threats 2
Reply with 50-75 words for below 6 postsAPA Format1. The threats related to cyber
security and internal attacks can cause a serious impact on the country’s economy
because of an attack on the pipelines that carry fuel or gas and the essential needs like
water will create a huge loss and they can be explosion and loss, as well as a scarcity of
them and this, will lead to the recovery activity and when the recovery cannot be done and
there will be a price that have to be paid by the country and this, in turn, will reduce the
levels of inventory and sometimes nothing will be left-back and the stock prices and the
investors will be in losses as the stock market gets affected when these kinds of scenarios
will occur. The cyber-attack can manipulate the systems security and can lead to dangerous
events and these when combined with insider an attack can turn into a large scale disaster
that will occur. These threats will be quarantined with the help of best practices towards
security and implementing multiple layers of security (Myers, 2018).The introduction of
diversity and commonality will help in containing the threats by seeing that we will get the
resource from any part of the world as there is a shortage in the resources that are more
skillful in the cyber security protection. If the organizations will stick to the policy of making
the recruitment only with the people available around who are just with low experiences
and low talent that will be a mistake as this will not help the organizations in combating
with the cyber security threats that are increasing day by day in the present world. There
will be a lot of benefits if the recruitment teams will introduce diverse teams in the
organization to fight and protect against the cyber security threats which will definitely
show a difference than the previous condition (phe.gov, 2019).ReferencesMyers, L. (2018).
How diversity in cybersecurity contributes to your company. Retrieved
from,https://www.welivesecurity.com/2018/03/14/diversity-cybersecurity-
company/phe.gov. (2019). Health Industry Cybersecurity Practices. Managing Threats and
Protecting Patients. Retrieved from,
https://www.phe.gov/preparedness/planning/405d/documents/hicp-main-
508.pdf2.Cybersecurity has increased to be a leading concern for the national security
agencies of the United States. Cyber threats to energy-producing in the oil and gas area are
of rising worry to trade and government. Like members in other significant businesses, oil
and gas firms are much of the time focuses on undercover work movement, which has
intensely moved on the web (Bronk, 2014).Department of Homeland Security (DHS) ICS
team in 2012 reported that 41 percent of energy companies were attacked by malicious
software (Clayton, 2013). Natural gas channel blasts, while distressing and repeatedly fatal,
aren’t the major concern for the power division. As an alternative, several sources explained
how outages at essential gas compressor stations might separate gas provisions to power
generators. Low gas forces possibly will strength power plants to flame in the course of
crisis fuel.Widely traded firms frequently examine their cyber threat in common provisions
in SEC filings. Walkway Pipeline Partners LP, the main gas diffusion firm, warned in a
current economic confession that assured cyber attacks may stay hidden for an extensive
stage, in addition to the assurance exposure for cyberattacks might not be adequate to face
all the fatalities that they may experience as risks keep on to go forward.The safety of
particular channel attributes on a subdivision base relics a vital fear, especially persons who
can highlight possible elevated outcomes. SCADA system can take a vital role by taking all
the necessary action and meanwhile operators may turn back to open the valves in certain
situations if necessary. SCADA system is a sort of new factor that has begun to be associated
with the internet as indicated by arranging to join. It is emphatically identified with our day
by day life, in this manner the ordinary activity of the system is basic and that is the
motivation behind why the system ought to be unequivocally secured (Kang,
2009).ReferencesBronk, C. (2014). Hacks on gas: Energy, cybersecurity, and US
defense.Clayton, B., & Segal, A. (2013). Addressing cyber threats to oil and gas suppliers.
Council on Foreign Relations.Kang, D. J., Lee, J. J., Kim, S. J., & Park, J. H. (2009, October).
Analysis on cyber threats to SCADA systems. In 2009 Transmission & Distribution
Conference & Exposition: Asia and Pacific (pp. 1-4). IEEE.3.Threats on National
Infrastructure (Pipelines) and its Impact on National EconomyThe article is referred to as
centers around a few dangers to the US petroleum gas utilities. It’s coordinated by a
programmer codenamed ‘UglyGorilla,’ who took touchy information from gas pipeline
organizations and ruptured the country’s economy (Sobczak, 2019). Those dangers have
been occurring and will keep on happening at a quickened rate, except if the dependable
divisions assume responsibility. Such risks, similar to the one on the country’s pipeline
tasks, have noteworthy to the country’s economy.It ends forward progress of any task, and
powers the offices and organizations worried, to return and address the ruptures.
Additionally, for any information seized, the organizations need to alter their frameworks
just as concoct new structures. Therefore, they are both resistant to further rupturing and
don’t depend on the information that has been taken dangers, economy, and assorted
variety or shared original example articles. Along these lines, the data stolen gets outdated
and doesn’t enable the programmers to accomplish more harm. The way that
establishments are compelled to do harm control, just as devise new ideas for positive
advancement, implies they slowdown in their tasks. This utilizes additional assets and cash
to avoid programmers.Assaults to the country’s flammable gas framework could close off a
vast number of individuals from getting to gas as they typically do. It would expand the
costs of the accessible asset and slow down the country’s advancement, yet besides,
contrarily influence the Dollar’s quality. Commonality and diversity could help alleviate the
digital dangers as it would oblige all Americans, paying little heed to race, sex, and different
qualifications. This is what is causing them to perform at their ideal levels (Craig, Rucker &
Richeson, 2018). Digital dangers will proceed into the future. Our lone choice is to ensure
our frameworks are sufficient, not to be powerless against those dangers, basically slowing
down the nation’s advancement.ReferencesCraig, M. A., Rucker, J. M., & Richeson, J. A.
(2018). The pitfalls and promise of increasing racial diversity: Threat, contact, and race
relations in the 21st century. Current Directions in Psychological Science, 27(3), 188-
193.Sobczak, B. (2019). Retrieved 5 November 2019, from https://burnmorecoal.com/wp-
content/uploads/2018/1…4.Cyber-attacks that successfully target national infrastructure
have a significant opportunity to disrupt our economy. In the assigned reading, we learned
of hackers attempting to disrupt the flow of natural gas, which could ultimately result in
failure to the electrical grid. Electricity is required for many of the necessities in our life,
such as producing water, powering public transportation (i.e. the subway), and lighting our
homes. Additionally, the information age is dependent on electricity for keeping the internet
accessible. Gas, electricity, and/or water outages are more than an inconvenience; they can
prove to be deadly.Venezuela has experienced a number of blackouts this year causing
citizens to drink directly from polluted water sources. According to Molina (2019), the
outage resulted in disruption to oil production as well governmental operations. Because
office workers were unable to perform their duties, employment was reduced and the
overall economy was effected negatively.Manipulating SCADA controls has the potential to
cause financial and personal loss when disabling safety systems. Malware has been
discovered that was designed to prevent emergency actions, such as opening relief valves,
from occurring in refineries and power plants (Kirkpatrick, 2019). Defeating such a system
in a nuclear power plant would have the potential of causing a catastrophic meltdown.Two
considerations that should be made in developing a plan to combat cyber-attacks include
diversity and commonality. While the two topics appear to be at odds with each other, there
are scenarios in which a middle-ground solution may be most effective.Diversity suggests
that different types of systems (hardware and software) be used throughout the design of a
system, such as in the selection of computer operating systems. This ensures that if one
system, such as Microsoft Windows, becomes compromised by malware, it will not
necessarily spread to systems running disparate operating systems, such as Linux. Having
an array of option makes the task of compromising all systems much more complicated
(IEEE Transactions, 2019). The goal is that, while some portions of the system may be
compromised, the remaining systems can be used during the attack or as a replacement
until other arrangements are made.Commonality is the process of ensuring that all agencies
are adopting the “best of the best― practices and learning from each other. Security
measures are applied uniformly in all areas, not just the ones that seem most important.
Amoroso (2013) says such policies may include firewall configurations, system patching,
password requirements, and much more. All areas are audited for compliance with the
understanding that compromise in any unit may have devastating potential.Additionally,
commonality is about creating uniform policy to enhance the standards of information
technology. Suggestions have been proposed to increase longevity in government positions
by matching salaries with the private sector and offering advanced leadership
opportunities. The goal is to keep the best employees working in fields in which they may
offer the most protection (Amoroso 2013).ReferencesA Diversity-Based Substation Cyber
Defense Strategy Utilizing Coloring Games. (2019). IEEE Transactions on Smart Grid, (5),
5405. https://doi.org/10.1109/TSG.2018.2881672Amoroso, E. G. (2013). Cyber attacks:
protecting national infrastructure. Amsterdam: Butterworth-HeinemannKirkpatrick, K.
(2019). Protecting Industrial Control Systems. Communications of the ACM, 62(10),
14–16. https://doi.org/10.1145/3355377Molina, B. (2019, March 12). Venezuela has
endured four days of blackouts. This is what it looks like there. Retrieved from
https://www.usatoday.com/story/news/world/2019/03/12/venezuela-blackouts-
political-unrest-photos/3138209002/5Cyber Threats against the National
InfrastructureMany of the attacks were done on the utilities of the natural gas in the United
States that can easily set the bells of the alarm. These take place in the community of the
intelligence of the United States. By using the sensitive data or the private data of the
information it implements particular persons the hackers are stealing the complete details
of the person in it. In this process, these are taken from the companies or industries of the
United States that it can breach the mile steel web which is more critical or difficult for all
the companies or the economy of the nation (Bawany, 2017).Some of the new hackers are
mainly trickled in the official security if the homes that are used in the particular security if
the information or the data with the operators of the pipelines in the United States. In many,
of cases, the laws of the enforcement are used in the entire process of the systems of it. The
systems of the transmission process may take for the gas if the natural and for the power
generation that it is one of the targets of hacking in the country or all over the world (Boyd,
2017).Many of the companies of the gas are taken up the security in the specific format or in
the good way thrash it has to be clearer. Overall the readiness of the cyber for all the sectors
is one of the black boxes to those is charged in it. In this case, the investigation of the energy
will be found. All the authorities of the resources are considered in the companies in the gas
pipeline lines and they have to estimate the complete process in the natural gas. To produce
all the powers in an organization the coal had supplied in the systems of the process (Zanin,
2018).ReferencesBawany, N., Shamsi, J., & Salah, K. (2017). DDoS Attack Detection and
Mitigation Using SDN: Methods, Practices, and Solutions. Arabian Journal for Science &
Engineering (Springer Science & Business Media B.V. ), 42(2), 425–441.
https://doi.org/10.1007/s13369-017-2414-5Boyd, C., Cremers, C., Feltz, M., Paterson, K.,
Poettering, B., & Stebila, D. (2017). ASICS: authenticated key exchange security
incorporating certification systems. International Journal of Information Security, 16(2),
151–171. https://doi.org/10.1007/s10207-015-0312-yZanin, M., Sun, X., & Wandelt, S.
(2018). Studying the Topology of Transportation Systems through Complex Networks:
Handle with Care. Journal of Advanced Transportation, 1–17.
https://doi.org/10.1155/2018/31561376The threat is a possible risk or danger that
exploits the weakness or vulnerability of the system, therefore, causing harm. Threats can
be intentional or accidental, intentional is where criminal organization interfere with the
system while accidental occurs as a result of computer malfunctioning (Min, Chai, & Han,
2015). Cybersecurity affects the economy negatively hindering its growth. However, the
government needs to implement better measures that will help curb these behaviors.
Through cybersecurity threats organizations have experienced continuous losses as a result
of hacking thus affecting the growth and expansion. As a result of this, the level of
unemployment among the youths increases thereby, hindering the growth of the
economy.Organizations that have experienced cyber-attacks have lost crucial information
which could be helpful to make better decisions for the improvement of the organization,
through these attacks, organizations are unable to improve, therefore, unable to perform
well in the economy (Sobczak, Northey, & Behr, 2019). Through introducing the strategy of
diversity and commonality the organizations are in a better position to mitigate such
threats. Through this strategy, organizations are in a position to spread the risk of attack
leading to a lower impact of such cybersecurity attacks.Diversity and commonality offers
the organization multiple ways of thinking thus allowing them to stay one step ahead of the
attackers (Carr, 2016). Through this, the organization will be in a position to reduce the
frequency and severity of threats in case they occur in an organization. In the current
economy where cybersecurity threats are increasing organizations should have a wide
range of security skills on their team to deal with such attacks. The main reason for the
increased cyber-attacks in the economy is the growth of technology. To minimize such
attacks organizations should embrace techniques such as cryptographic techniques, end to
end authentications and implementing a firewall to prevent the system from being attacked
by hackers.ReferencesCarr, M. (2016). Public-private partnerships in national cyber-
security strategies. International Affairs, 92(1), 43-62.Min, K. S., Chai, S. W., & Han, M.
(2015). An international comparative study on cybersecurity strategy. International Journal
of Security and Its Applications, 9(2), 13-20.Sobczak, B., Northey, H., & Behr, P. (2019).
SECURITY: Cyber raises threats against America’s energy backbone. Retrieved 5 November
2019, from https://www.eenews.net/stories/1060054924

More Related Content

Similar to discuss how the types of threats discussed in the article.docx

Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityiFluidsEng
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
Addressing Policy Challenges of Disruptive Technologies
Addressing Policy Challenges of Disruptive TechnologiesAddressing Policy Challenges of Disruptive Technologies
Addressing Policy Challenges of Disruptive TechnologiesAraz Taeihagh
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docxjackiewalcutt
 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciFabio Massacci
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxjeanettehully
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxwlynn1
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...online Marketing
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Taking a broader view of supply chain resilience
Taking a broader view of supply chain resilienceTaking a broader view of supply chain resilience
Taking a broader view of supply chain resilienceGláucio Bastos
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk Steve Mahnke
 

Similar to discuss how the types of threats discussed in the article.docx (20)

Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
Addressing Policy Challenges of Disruptive Technologies
Addressing Policy Challenges of Disruptive TechnologiesAddressing Policy Challenges of Disruptive Technologies
Addressing Policy Challenges of Disruptive Technologies
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
IEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-MassacciIEEE-S&P Magazine-2015-Massacci
IEEE-S&P Magazine-2015-Massacci
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docxRunning head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Taking a broader view of supply chain resilience
Taking a broader view of supply chain resilienceTaking a broader view of supply chain resilience
Taking a broader view of supply chain resilience
 
An analysis of the supply chain risk
An analysis of the supply chain risk An analysis of the supply chain risk
An analysis of the supply chain risk
 

More from bkbk37

Range of.docx
Range of.docxRange of.docx
Range of.docxbkbk37
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docxbkbk37
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxbkbk37
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxbkbk37
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxbkbk37
 
Race and.docx
Race and.docxRace and.docx
Race and.docxbkbk37
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docxbkbk37
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docxbkbk37
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docxbkbk37
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxbkbk37
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docxbkbk37
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docxbkbk37
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxbkbk37
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxbkbk37
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxbkbk37
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxbkbk37
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxbkbk37
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxbkbk37
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxbkbk37
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docxbkbk37
 

More from bkbk37 (20)

Range of.docx
Range of.docxRange of.docx
Range of.docx
 
Ralph Waldo Emerson.docx
Ralph Waldo Emerson.docxRalph Waldo Emerson.docx
Ralph Waldo Emerson.docx
 
Raising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docxRaising Minimum An explanation of the its.docx
Raising Minimum An explanation of the its.docx
 
Rail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docxRail Project A goal of the Obama administration.docx
Rail Project A goal of the Obama administration.docx
 
Racism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docxRacism toward Indigenous peoples in Canada.docx
Racism toward Indigenous peoples in Canada.docx
 
Race and.docx
Race and.docxRace and.docx
Race and.docx
 
R2P and Syria.docx
R2P and Syria.docxR2P and Syria.docx
R2P and Syria.docx
 
Racial Disparities.docx
Racial Disparities.docxRacial Disparities.docx
Racial Disparities.docx
 
Race and Technology.docx
Race and Technology.docxRace and Technology.docx
Race and Technology.docx
 
QuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docxQuickBooks uses windows API to follow orders to get updates.docx
QuickBooks uses windows API to follow orders to get updates.docx
 
Questions What are the purposes of Just.docx
Questions What are the purposes of Just.docxQuestions What are the purposes of Just.docx
Questions What are the purposes of Just.docx
 
Questions to Each group you read about is.docx
Questions to Each group you read about is.docxQuestions to Each group you read about is.docx
Questions to Each group you read about is.docx
 
Questions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docxQuestions that must be answered in your plus other.docx
Questions that must be answered in your plus other.docx
 
Questions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docxQuestions for Brief Explicit Spiritual.docx
Questions for Brief Explicit Spiritual.docx
 
Question Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docxQuestion Libya recently announced that it is claiming a.docx
Question Libya recently announced that it is claiming a.docx
 
Question Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docxQuestion Use the Internet or the IGlobal Resource.docx
Question Use the Internet or the IGlobal Resource.docx
 
Question Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docxQuestion Please define motivation and discuss why it is.docx
Question Please define motivation and discuss why it is.docx
 
Question share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docxQuestion share your perspective on personal data as a.docx
Question share your perspective on personal data as a.docx
 
QEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docxQEP Assignment Death Penalty.docx
QEP Assignment Death Penalty.docx
 
Question In your what are the main workforce.docx
Question In your what are the main workforce.docxQuestion In your what are the main workforce.docx
Question In your what are the main workforce.docx
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

discuss how the types of threats discussed in the article.docx

  • 1. discuss how the types of threats discussed in the article referenced above could impact our economy and how implementing diversity and commonality could help mitigate these threats 2 Reply with 50-75 words for below 6 postsAPA Format1. The threats related to cyber security and internal attacks can cause a serious impact on the country’s economy because of an attack on the pipelines that carry fuel or gas and the essential needs like water will create a huge loss and they can be explosion and loss, as well as a scarcity of them and this, will lead to the recovery activity and when the recovery cannot be done and there will be a price that have to be paid by the country and this, in turn, will reduce the levels of inventory and sometimes nothing will be left-back and the stock prices and the investors will be in losses as the stock market gets affected when these kinds of scenarios will occur. The cyber-attack can manipulate the systems security and can lead to dangerous events and these when combined with insider an attack can turn into a large scale disaster that will occur. These threats will be quarantined with the help of best practices towards security and implementing multiple layers of security (Myers, 2018).The introduction of diversity and commonality will help in containing the threats by seeing that we will get the resource from any part of the world as there is a shortage in the resources that are more skillful in the cyber security protection. If the organizations will stick to the policy of making the recruitment only with the people available around who are just with low experiences and low talent that will be a mistake as this will not help the organizations in combating with the cyber security threats that are increasing day by day in the present world. There will be a lot of benefits if the recruitment teams will introduce diverse teams in the organization to fight and protect against the cyber security threats which will definitely show a difference than the previous condition (phe.gov, 2019).ReferencesMyers, L. (2018). How diversity in cybersecurity contributes to your company. Retrieved from,https://www.welivesecurity.com/2018/03/14/diversity-cybersecurity- company/phe.gov. (2019). Health Industry Cybersecurity Practices. Managing Threats and Protecting Patients. Retrieved from, https://www.phe.gov/preparedness/planning/405d/documents/hicp-main- 508.pdf2.Cybersecurity has increased to be a leading concern for the national security agencies of the United States. Cyber threats to energy-producing in the oil and gas area are of rising worry to trade and government. Like members in other significant businesses, oil and gas firms are much of the time focuses on undercover work movement, which has
  • 2. intensely moved on the web (Bronk, 2014).Department of Homeland Security (DHS) ICS team in 2012 reported that 41 percent of energy companies were attacked by malicious software (Clayton, 2013). Natural gas channel blasts, while distressing and repeatedly fatal, aren’t the major concern for the power division. As an alternative, several sources explained how outages at essential gas compressor stations might separate gas provisions to power generators. Low gas forces possibly will strength power plants to flame in the course of crisis fuel.Widely traded firms frequently examine their cyber threat in common provisions in SEC filings. Walkway Pipeline Partners LP, the main gas diffusion firm, warned in a current economic confession that assured cyber attacks may stay hidden for an extensive stage, in addition to the assurance exposure for cyberattacks might not be adequate to face all the fatalities that they may experience as risks keep on to go forward.The safety of particular channel attributes on a subdivision base relics a vital fear, especially persons who can highlight possible elevated outcomes. SCADA system can take a vital role by taking all the necessary action and meanwhile operators may turn back to open the valves in certain situations if necessary. SCADA system is a sort of new factor that has begun to be associated with the internet as indicated by arranging to join. It is emphatically identified with our day by day life, in this manner the ordinary activity of the system is basic and that is the motivation behind why the system ought to be unequivocally secured (Kang, 2009).ReferencesBronk, C. (2014). Hacks on gas: Energy, cybersecurity, and US defense.Clayton, B., & Segal, A. (2013). Addressing cyber threats to oil and gas suppliers. Council on Foreign Relations.Kang, D. J., Lee, J. J., Kim, S. J., & Park, J. H. (2009, October). Analysis on cyber threats to SCADA systems. In 2009 Transmission & Distribution Conference & Exposition: Asia and Pacific (pp. 1-4). IEEE.3.Threats on National Infrastructure (Pipelines) and its Impact on National EconomyThe article is referred to as centers around a few dangers to the US petroleum gas utilities. It’s coordinated by a programmer codenamed ‘UglyGorilla,’ who took touchy information from gas pipeline organizations and ruptured the country’s economy (Sobczak, 2019). Those dangers have been occurring and will keep on happening at a quickened rate, except if the dependable divisions assume responsibility. Such risks, similar to the one on the country’s pipeline tasks, have noteworthy to the country’s economy.It ends forward progress of any task, and powers the offices and organizations worried, to return and address the ruptures. Additionally, for any information seized, the organizations need to alter their frameworks just as concoct new structures. Therefore, they are both resistant to further rupturing and don’t depend on the information that has been taken dangers, economy, and assorted variety or shared original example articles. Along these lines, the data stolen gets outdated and doesn’t enable the programmers to accomplish more harm. The way that establishments are compelled to do harm control, just as devise new ideas for positive advancement, implies they slowdown in their tasks. This utilizes additional assets and cash to avoid programmers.Assaults to the country’s flammable gas framework could close off a vast number of individuals from getting to gas as they typically do. It would expand the costs of the accessible asset and slow down the country’s advancement, yet besides, contrarily influence the Dollar’s quality. Commonality and diversity could help alleviate the digital dangers as it would oblige all Americans, paying little heed to race, sex, and different
  • 3. qualifications. This is what is causing them to perform at their ideal levels (Craig, Rucker & Richeson, 2018). Digital dangers will proceed into the future. Our lone choice is to ensure our frameworks are sufficient, not to be powerless against those dangers, basically slowing down the nation’s advancement.ReferencesCraig, M. A., Rucker, J. M., & Richeson, J. A. (2018). The pitfalls and promise of increasing racial diversity: Threat, contact, and race relations in the 21st century. Current Directions in Psychological Science, 27(3), 188- 193.Sobczak, B. (2019). Retrieved 5 November 2019, from https://burnmorecoal.com/wp- content/uploads/2018/1…4.Cyber-attacks that successfully target national infrastructure have a significant opportunity to disrupt our economy. In the assigned reading, we learned of hackers attempting to disrupt the flow of natural gas, which could ultimately result in failure to the electrical grid. Electricity is required for many of the necessities in our life, such as producing water, powering public transportation (i.e. the subway), and lighting our homes. Additionally, the information age is dependent on electricity for keeping the internet accessible. Gas, electricity, and/or water outages are more than an inconvenience; they can prove to be deadly.Venezuela has experienced a number of blackouts this year causing citizens to drink directly from polluted water sources. According to Molina (2019), the outage resulted in disruption to oil production as well governmental operations. Because office workers were unable to perform their duties, employment was reduced and the overall economy was effected negatively.Manipulating SCADA controls has the potential to cause financial and personal loss when disabling safety systems. Malware has been discovered that was designed to prevent emergency actions, such as opening relief valves, from occurring in refineries and power plants (Kirkpatrick, 2019). Defeating such a system in a nuclear power plant would have the potential of causing a catastrophic meltdown.Two considerations that should be made in developing a plan to combat cyber-attacks include diversity and commonality. While the two topics appear to be at odds with each other, there are scenarios in which a middle-ground solution may be most effective.Diversity suggests that different types of systems (hardware and software) be used throughout the design of a system, such as in the selection of computer operating systems. This ensures that if one system, such as Microsoft Windows, becomes compromised by malware, it will not necessarily spread to systems running disparate operating systems, such as Linux. Having an array of option makes the task of compromising all systems much more complicated (IEEE Transactions, 2019). The goal is that, while some portions of the system may be compromised, the remaining systems can be used during the attack or as a replacement until other arrangements are made.Commonality is the process of ensuring that all agencies are adopting the “best of the best― practices and learning from each other. Security measures are applied uniformly in all areas, not just the ones that seem most important. Amoroso (2013) says such policies may include firewall configurations, system patching, password requirements, and much more. All areas are audited for compliance with the understanding that compromise in any unit may have devastating potential.Additionally, commonality is about creating uniform policy to enhance the standards of information technology. Suggestions have been proposed to increase longevity in government positions by matching salaries with the private sector and offering advanced leadership opportunities. The goal is to keep the best employees working in fields in which they may
  • 4. offer the most protection (Amoroso 2013).ReferencesA Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games. (2019). IEEE Transactions on Smart Grid, (5), 5405. https://doi.org/10.1109/TSG.2018.2881672Amoroso, E. G. (2013). Cyber attacks: protecting national infrastructure. Amsterdam: Butterworth-HeinemannKirkpatrick, K. (2019). Protecting Industrial Control Systems. Communications of the ACM, 62(10), 14–16. https://doi.org/10.1145/3355377Molina, B. (2019, March 12). Venezuela has endured four days of blackouts. This is what it looks like there. Retrieved from https://www.usatoday.com/story/news/world/2019/03/12/venezuela-blackouts- political-unrest-photos/3138209002/5Cyber Threats against the National InfrastructureMany of the attacks were done on the utilities of the natural gas in the United States that can easily set the bells of the alarm. These take place in the community of the intelligence of the United States. By using the sensitive data or the private data of the information it implements particular persons the hackers are stealing the complete details of the person in it. In this process, these are taken from the companies or industries of the United States that it can breach the mile steel web which is more critical or difficult for all the companies or the economy of the nation (Bawany, 2017).Some of the new hackers are mainly trickled in the official security if the homes that are used in the particular security if the information or the data with the operators of the pipelines in the United States. In many, of cases, the laws of the enforcement are used in the entire process of the systems of it. The systems of the transmission process may take for the gas if the natural and for the power generation that it is one of the targets of hacking in the country or all over the world (Boyd, 2017).Many of the companies of the gas are taken up the security in the specific format or in the good way thrash it has to be clearer. Overall the readiness of the cyber for all the sectors is one of the black boxes to those is charged in it. In this case, the investigation of the energy will be found. All the authorities of the resources are considered in the companies in the gas pipeline lines and they have to estimate the complete process in the natural gas. To produce all the powers in an organization the coal had supplied in the systems of the process (Zanin, 2018).ReferencesBawany, N., Shamsi, J., & Salah, K. (2017). DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions. Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 42(2), 425–441. https://doi.org/10.1007/s13369-017-2414-5Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B., & Stebila, D. (2017). ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security, 16(2), 151–171. https://doi.org/10.1007/s10207-015-0312-yZanin, M., Sun, X., & Wandelt, S. (2018). Studying the Topology of Transportation Systems through Complex Networks: Handle with Care. Journal of Advanced Transportation, 1–17. https://doi.org/10.1155/2018/31561376The threat is a possible risk or danger that exploits the weakness or vulnerability of the system, therefore, causing harm. Threats can be intentional or accidental, intentional is where criminal organization interfere with the system while accidental occurs as a result of computer malfunctioning (Min, Chai, & Han, 2015). Cybersecurity affects the economy negatively hindering its growth. However, the government needs to implement better measures that will help curb these behaviors. Through cybersecurity threats organizations have experienced continuous losses as a result
  • 5. of hacking thus affecting the growth and expansion. As a result of this, the level of unemployment among the youths increases thereby, hindering the growth of the economy.Organizations that have experienced cyber-attacks have lost crucial information which could be helpful to make better decisions for the improvement of the organization, through these attacks, organizations are unable to improve, therefore, unable to perform well in the economy (Sobczak, Northey, & Behr, 2019). Through introducing the strategy of diversity and commonality the organizations are in a better position to mitigate such threats. Through this strategy, organizations are in a position to spread the risk of attack leading to a lower impact of such cybersecurity attacks.Diversity and commonality offers the organization multiple ways of thinking thus allowing them to stay one step ahead of the attackers (Carr, 2016). Through this, the organization will be in a position to reduce the frequency and severity of threats in case they occur in an organization. In the current economy where cybersecurity threats are increasing organizations should have a wide range of security skills on their team to deal with such attacks. The main reason for the increased cyber-attacks in the economy is the growth of technology. To minimize such attacks organizations should embrace techniques such as cryptographic techniques, end to end authentications and implementing a firewall to prevent the system from being attacked by hackers.ReferencesCarr, M. (2016). Public-private partnerships in national cyber- security strategies. International Affairs, 92(1), 43-62.Min, K. S., Chai, S. W., & Han, M. (2015). An international comparative study on cybersecurity strategy. International Journal of Security and Its Applications, 9(2), 13-20.Sobczak, B., Northey, H., & Behr, P. (2019). SECURITY: Cyber raises threats against America’s energy backbone. Retrieved 5 November 2019, from https://www.eenews.net/stories/1060054924