Cyber

Data Analyst

This role examines data from different sources with the goal of [providing insight to organization, mission/business processes, and information systems. Designs, documents, and implements custom algorithms, workflow processes, and large data sets used for modeling, data mining, and research purposes.

Personnel performing this role may unofficially or alternatively be called:

Cyber Storm 2020 Fact Sheet

Cyber Storm is the Cybersecurity and Infrastructure Security Agency’s (CISA) national-level cyber exercise that brings together the public and private sector to simulate response to a cyber crisis impacting the nation’s critical infrastructure. The exercise is designed to assess cybersecurity preparedness and examine incident response processes, procedures, and information sharing.

Cyber Storm 2020

Cyber Storm is the Cybersecurity and Infrastructure Security Agency’s (CISA) national-level cyber exercise that brings together the public and private sector to simulate response to a cyber crisis impacting the nation’s critical infrastructure. The exercise is designed to assess cybersecurity preparedness and examine incident response processes, procedures, and information sharing.

Protect Operational Technologies and Control Systems against Cyber Attacks

Cyber actors have demonstrated their willingness to conduct cyber attacks against critical infrastructure by exploiting Internet-accessible Operational Technology (OT) assets. Due to the increase in adversary capabilities and activities, the criticality to U.S. national security and way of life, and the vulnerability of OT systems, civilian infrastructure makes attractive targets for foreign powers attempting to harm to US interests or retaliate for perceived US aggressive.
Last Published Date: July 23, 2020

Protect2020 Cyber Incident Guide

The Planning Guide and templates are voluntary tools to help jurisdictions effectively recognize and respond to potential cyber incidents. Election offices can use this information as a basic cyber incident response plan or integrate it into a broader plan based on their specific needs. The templates, which can be tailored to fit the exact needs of each jurisdiction, include:

CISA Releases Cyber Risks to 911: TDoS Fact Sheet

Telephony denial of service attacks (TDoS) present a unique risk to public safety communications stakeholders, including Emergency Communications Centers (ECC), Publics Safety Answering Points (PSAP), and other 911 dispatch centers. TDoS events overload communications network elements with telephone calls—disrupting a jurisdiction’s ability to provide emergency response services.

System Administrator

This role responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

Personnel performing this role may unofficially or alternatively be called: