This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
War

Secuism software

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Secuism software

Introduction

Secuism is constructive software designed for specifying attack mechanisms, evaluating their consequence. It has GUI allowing the user to be able to make his computer network a virtual one according to his design .it is having several modes: an Advanced mode which supports the direct command level testing of an indeed given network model. The professional mode allows multiple cyber-attack simulation, by providing advanced analysis for the link of an individual system (Park, et al 2001). The primary method gives knowledge of cyber security attack mechanism by retrieving the scenario on database. Application mode allows the user to simulate their customized networks. The fact is that without CNO the above modes enable users to run the simulation, Secusim is an example of simulation software to use in cyber-attack modeling and simulation.

OPNET is employed in some few cyber-attack simulation deals with the analysis of the commercial device, network, protocols and even the application. It uses modeling of these networks, VoIP, TCP; OSFv3.Opnet ability to simulate computer systems leads to cyber-attack simulation. Sakhardande SUNY under a denial of service attack uses modeling and simulation to test the network performance.

Don't use plagiarised sources.Get your custom essay just from $11/page

Net ENGINE in this the simulation is in charge of a simulated domain with the collection of both software and hardware system on simulated computer network. Teamwork is used in the in simulation .They communicate using simulated email, the instant message this are vulnerable to cyber-attack. For example, the simulation may implement generic attacks like DDoS, virus. They stimulate an attack. Net Engine is useful in simulation software and simulates a large number of computer networks under cyber-attack.

The public sector has got the greater insight on the potential of cyber-attacks. This concern is shown by the increase in training for defense against particular attack scenarios and preparation of contingency.US air force has conducted some of the defiance network simulation in SIMTEX and also focusing on cyber warfare through integrating cyber-attack scenario within current war game simulators such as Modern Air Power(Sakhardande,2008). The work of the developing an experimental infrastructure to simulate cyber-attack is ongoing in as shown in the efforts to develop the National Cyber Range and military divisions work to build their own cyber range. DARPA National Cyber Range the US Government’s Defense Advanced Research Projects Agency (DARPA) announced in 2008 the creation of a National Cyber Range (NCR). The project is intended to become a resource available to US military forces and government agencies for testing cyber programs (Costantini, 2007). The project is still in progress with the latest news being the selection of two primary contractors to build and evaluate prototype ranges.

Another example is CAAJED ‘06 While SIMTEX simulates the mechanics of an attack on a computer network, CAAJED focuses on the bigger picture and the kinetic effects of cyber-attacks in a war situation. CAAJED is a manual integration of CNO and cyber-attacks with the US Air Force war simulator Modern Air Power (MAP). CAAJED consists of all the features of MAP such as the ability to play the war game as a human versus human, human versus computer opponent, or computer versus computer contest.

There are several practices that should be implemented when developing a cyber security strategy within a security enterprise. This includes the following. The cyber security should be based on risks. In order to build a risk-based approach to managing national cyber security risks, nations must first create, articulate and implement a framework for evaluating national cyber risks and prioritizing appropriate protections and solutions. Another practice should be focusing on the outcome. We should focus on the required final state rather than prescribing and naming the means to achieve it. We should also measure progress towards that end state, which is the final state. Countries should also put in place the practice of prioritization. This whereby a graduated approach is initiated to vitality, recognizing that failure are not equal among critical vital assets or across critical sectors (Park, et al 2001). Cyber security should also include protections for privacy and civil liberties based upon privacy and civil liberties on the global relevance of the system. It should create integration in international standards to the maximum extent possible, keeping in mind the goal of harmonization wherever possible.

Cyber security also needs to consider agreements, policies, frameworks and practices. Cybersecurity should also major the establishment of trusted information sharing mechanisms. Sharing of information among different stakeholders is a powerful mechanism to better capture and comprehends a constantly changing environment. It is a form of strategic partnership among the involved stakeholders.

Different IT persons play different roles in cyber security. Software engineers are the system analysts and programmers who do the coding. Web designers are the people who do the web services in cyber security (Park, et al 2001). They develop the web, they the design the graphics, animations and games. The system architects and designers do the system developments. Network support personnel help in rectifying network related problems such as internet access and internet failures. They assist in managing user accounts. Software support helps in troubleshooting when software fails to work out properly and they also monitor software systems. Planning in developing cyber security strategy plays a very vital role. Planning helps in identifying proper co-operation between the involved stakeholders. Engaging stakeholders are essential steps for the success of the strategy.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask