The assignment is attached

Running head: CYBER AND PHYSICAL SECURITY VULNERABILITIES AND METHODOLOGIES

The History of Cybersecurity

Tracy Owens

HLS470 Cyber and Physical Security Vulnerabilities and Methodologies

Trident University International

February 18, 2019

The term cyber and physical security delegates to the process of guarding devices, software, networks, resources, infrastructures and information from physical activities and incidences. This results to significant losses or destruction to business, government agencies or academic institutions as for the last few years, tragedies causing great sufferings have occurred. Due to the increased total number of disasters and the contingency of a pair of physical and cyber threats, academic and government organizations have suggested employment technology founded methodologies for cyber and physical security. On vulnerabilities, entities would win the weaknesses of terrorist attacking them.

First and foremost, the term is essential in technologies developed and linked to the IP connections through an open APIs, this to lead chances for many automated physical events solutions becoming a reality. The cyber and physical security technologies are important as they established connections between devices which monitor plans, movements, and activities of terrorist. They also ensured that detailed cyber infrastructures will developed rapidly. Some operations in the new paradigm protect networks of their institutions and make sure terrorist cannot enter into them. However, the established systems are essential in creating countermeasures to these organizations. For example, they can detect any high injurious incidence and go ahead and reduce the effect they cause or cease the event from happening (Rick, 2018).

With the stealing of important data by hackers, agencies and businesses became alert to cyber defense. Physical violations brought about bigger risks of attacks to government computers than cyber intrusions. This is how physical security came about because of its access that opens more passages of attacks. This is why DHS started to rethink cyber strategies while searching for a more successful way to incorporate both cyber and physical defenses. In 2017, DHS started merging the two together to create a Cybersecurity and Infrastructure Protection Agency.











References

Maryland Coordination and Analysis Center. (2016). Critical Infrastructure News. Retrieved from:http://www.mcac.maryland.gov/newsroom/Critical%20Infrastructure%20News/why-dhs-is-merging-cyber-and-physical-security