Friday, May 15, 2020

Security Measures For The Port Of Boston Essay - 1212 Words

Described as a weakness in security, vulnerabilities represent a â€Å"gap or exposure in the protection of an asset that can lead to damage or destruction†¦Ã¢â‚¬  (Edwards Goodrich, 2013, p. 12). Much like other transportation systems, the Port of Boston has several vulnerabilities that must be adequately addressed in order to properly secure the port. The top three vulnerabilities to the Port of Boston are listed below. Cyber related vulnerabilities present the greatest risk to the Port of Boston. Conley Terminal’s reliance on networked systems to plan, manage and execute daily port operations makes it vulnerable to a number of cyber related threats including network hacking and viruses. Although cyber awareness has steadily increased over the years, Kramek (2013) points out that â€Å"cybersecurity awareness in U.S. port facilities [is] generally low [and] the cybersecurity culture in U.S. port facilities is generally lacking† (p. 27). This could be for a number of reasons, but is generally attributed to a ports focus on â€Å"MTSA-required physical security measures† (Kramek, 2013, p. 27) and the fact that cyberattacks on port facilities are exceedingly rare. Failure to address this critical vulnerability could affect a number of seaside and portside systems including industrial control, navigation and communication systems on a ship and terminal operating systems and business operating systems at the port. Poor cybersecurity practices could lead to a number consequencesShow MoreRelatedThe Terrorist Attack On The World Trade Center1559 Words   |  7 Pageswill examine are the terrorist attack on the World Trade Center that took place on February 26, 1993 and The Boston Marathon Bombing took place on April 15. 2013. I will also be providing an overview of the terrorist attack at the World Trade Center and the Boston Marathon Bombing. I will explain the lessons learned from each attack in my own opinion. I will also desc ribe what protective measures were taken during the attacks to prevent further casualties and injuries. The attack on The World Trade CenterRead MoreVulnerability Assesment Essay1723 Words   |  7 Pagesthreats, putting their security in order of priority, explaining and defending your choices. Terrorism vulnerability assessments were created to criticize any â€Å"Achilles’ heel† in a security system that can be exploited by anyone willing to do harm to the location, an individual, or coordinated event. It assesses the weaknesses of facilities across a wide range of possible threats or hazards and creates a basis for determining physical and operational improvement measures to assure their protectionRead MoreThe Bombing Of The United States850 Words   |  4 Pagesour weaknesses and in those weaknesses they are able to successfully plan attacks on us. So since 9/11, the DHS and other government agencies have gotten together, evaluated all known and possible vulnerabilities in all areas of the U.S. security systems in ports, on land and in the air to eliminate them. So far the U.S. has been very resilient, with the focus on a united front, a collaboration of efforts to restore and maintain peace worldwide. We suffered a terrible loss from the attacks of 9/11Read MorePart2 Cmit 350 Essay3535 Words   |  15 Pagesdevice passwords on both console port (out-of-band communications) and VTY (Telnet/in-band communications). All passwords should be encrypted. Required Implementation: Configure all devices hostnames as per the xACME topology Configure encrypted passwords (console and Telnet ports) on all devices Configure MOTD and Login banner for one of the switches Create Server VLANS, Faculty VLANS, Instructional VLANS and Administrative VLANs on all switches Assign ports to VLANs on all switches AssignRead MoreLand Of The Fearful Or Home Essay1523 Words   |  7 Pagesdown the drain, and the sense of security and safety was nowhere to be found. America’s response to acts of terrorism that have targeted American citizens over the last many years has inadvertently perpetuated a lingering state of terror and anxiety in this country. The 21st century has been full of responses to terrorism in the specificity of security measures. In November of 2002, fourteen months after the 9/11 terrorist attacks, The Department of Homeland Security was established as a responseRead MoreCisco Networking Configuration Project Part 1. Summary.1149 Words   |  5 PagesSite Springfield site device and STP configurations challenges and implementation II. Bibliography xACME summary The trade school in the Springfield region has developed and implemented a WAN link to integrate with all sites as follows: Worchester, Boston, Sacramento and Los Angeles, for better communication purposes. The expansion of their networks has come with some difficulties in communicating from one region to the other, due to their IP address scheme, leading configured networks are not functioningRead Morenetwork consultation proposal Essay1636 Words   |  7 Pagesnetwork should integrate sound, video, synchronous, as well as asynchronous data. When designing the LAN network, the organizational goals of DesignIT should be factored in the LAN design. I will also pay attention to network throughput, line charges, security, and the integration of newer technologies in the future. When designing a LAN network, some issues must be considered, one of these issues is the organization’s short, medium, and long term goals. Several factors to be considered include the networkRead MoreCas e Study : Network Consultation For Designit1668 Words   |  7 Pagesnetwork should integrate sound, video, synchronous, as well as asynchronous data. When designing the LAN network, the organizational goals of DesignIT should be factored in the LAN design. I will also pay attention to network throughput, line charges, security, and the integration of newer technologies in the future. When designing a LAN network, some issues must be considered, one of these issues is the organization’s short, medium, and long term goals. Several factors to be considered include the networkRead MoreThe attacks of 9/11 in 2001 shed a light on many different weaknesses relevant to the security of1500 Words   |  6 PagesThe attacks of 9/11 in 2001 shed a light on many different weaknesses relevant to the security of the United States regarding communication, and disaster response. On every level of government— federal, state, and local— substandard communication methods contrib uted to the deaths of nearly 3000 people, as well as the growing number of people dying from illnesses that resulted from participating in the cleanup at Ground Zero. There were many communication challenges faced by agencies tasked with respondingRead MoreEssay on Office of Homeland Security1434 Words   |  6 PagesOffice of Homeland Security Just as our parents and grandparents remember where they were and what they were doing when President John F. Kennedy was shot, so will it be with this generation when asked the same questions pertaining to September 11, 2001. This horrific event will be a scar on the body of our wonderful nation until the end of time. Parents lost children, children lost parents, spouses lost their heartmates – so much anguish and emotional devastation demands that something be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.