{"id":39308,"date":"2024-04-26T23:04:54","date_gmt":"2024-04-26T23:04:54","guid":{"rendered":"http:\/\/localhost\/branding\/applying-cybersecurity-at-the-state-and-local-government-level\/"},"modified":"2024-04-26T23:04:54","modified_gmt":"2024-04-26T23:04:54","slug":"applying-cybersecurity-at-the-state-and-local-government-level","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/","title":{"rendered":"Applying Cybersecurity at the State and Local Government Level"},"content":{"rendered":"<p>Applying Cybersecurity at the State and Local Government Level<\/p>\n<p>Response<\/p>\n<p>Cybersecurity is one of the essential aspects of an institution due o the rising cases of cyberattacks (de Bruijn &amp; Janssen, 2017). Your introduction about cybersecurity in state and local government is incredible as it is easy to relate, using the examples you provided. State and local governments hold highly important information; hence cybersecurity ensures protection of the system and the information in it hence protected users. The Mat-Su Borough and city of Valdez are some of the world&#8217;s known cyberattacks that have occurred in history hence mentioning them in the introduction highlights the contents of the essay. Mat-Su as declared the worst of its kind of cyber-attacks, with its recovery value exceeding $2 million (Hollander, 2018), which shows the losses that an institution can incur due to cyberattacks. Other than the two incidents, the state of Alaska also underwent a cyberattack caused by the gaps identified in the cybersecurity system. The gaps provided an opportunity for cyberattacks to find a way through to the system. The introduction shows the importance of cybersecurity to an institution and how it can help prevent losses; as a result of a loss of information. <\/p>\n<p>The state and local government agencies hold essential information about the public and the governments, which they use to run the states. Therefore, losing such information may compromise their actions in providing services and normal government operations. I support your comment that the DHS and the federal government should work to ensure the cybersecurity of the state and local government agencies as well as the public-private relationships. The collaboration would quickly ensure that the technological system being used in the agencies are highly protected from attacks and that the risks are prevented or easily identified by the staff. The security of the people depending on the state and local government depends on the safety of the information stored in the systems used in running the specified government agencies.I also think that the development of technology has made it easier for the prevention and mitigation of cyber risks to occur. Technological methods, such as artificial intelligence has been proven to help in mitigating threats in the IoT system (&#8220;Artificial Intelligence is key cybersecurity weapon in the IoT era: Research &#8211; ET CIO&#8221;, 2018). Therefore, institutions that use the internet of things could integrate its system with artificial intelligence hence any threats that occur are identified early enough and prevented before causing ham to the institution. <\/p>\n<p>Also, just as the Mat-Su incident led to the implementation of procedures and policies to reduce risks, the local government require such regulations and also a provision of cyber education training to employees. The state government has a role to play in protecting the cybersecurity of critical infrastructure in the state (State of the States: The Role of State Governments in Protecting the Cybersecurity of Critical Infrastructure, 2019). However, to accomplish the role, the state government itself needs to have protected its information and put measures to prevent cyberattacks. Exposure to risks by the state government would lead to exposure to the critical infrastructure hence increasing the exposure to threats. Cybersecurity in state and local government helps to protect sensitive information, hence reducing the exposure to cyberattacks that may lead to losses in the future. <\/p>\n<p>References<\/p>\n<p>Artificial Intelligence is key cybersecurity weapon in the IoT era: Research &#8211; ET CIO. (2018). Retrieved 15 July 2020, from https:\/\/cio.economictimes.indiatimes.com\/news\/digital-security\/artificial-intelligence-is-key-cybersecurity-weapon-in-the-iot-era-research\/66084064de Bruijn, H., &amp; Janssen, M. (2017). Building Cybersecurity Awareness: The need for evidence-based framing strategies.\u00a0Government Information Quarterly,\u00a034(1), 1-7. doi: 10.1016\/j.giq.2017.02.007<\/p>\n<p>Hollander, Z. (2018). Price tag for cyberattack on Mat-Su Borough now tops $2 million. Retrieved 15 July 2020, from https:\/\/www.adn.com\/alaska-news\/mat-su\/2018\/10\/11\/price-tag-for-mat-su-cyberattack-now-tops-2-million\/<\/p>\n<p>Globa Cyber Policy Watch. (2019).\u00a0State of the States: The Role of State Governments in Protecting the Cybersecurity of Critical Infrastructure\u00a0[Ebook].<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Applying Cybersecurity at the State and Local Government Level Response Cybersecurity is one of the essential aspects of an institution<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-39308","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Applying Cybersecurity at the State and Local Government Level - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Applying Cybersecurity at the State and Local Government Level - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Applying Cybersecurity at the State and Local Government Level Response Cybersecurity is one of the essential aspects of an institution\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T23:04:54+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/\",\"name\":\"Applying Cybersecurity at the State and Local Government Level - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T23:04:54+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Applying Cybersecurity at the State and Local Government Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Applying Cybersecurity at the State and Local Government Level - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/","og_locale":"en_US","og_type":"article","og_title":"Applying Cybersecurity at the State and Local Government Level - sheilathewriter","og_description":"Applying Cybersecurity at the State and Local Government Level Response Cybersecurity is one of the essential aspects of an institution","og_url":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T23:04:54+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/","url":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/","name":"Applying Cybersecurity at the State and Local Government Level - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T23:04:54+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/applying-cybersecurity-at-the-state-and-local-government-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Applying Cybersecurity at the State and Local Government Level"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/39308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=39308"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/39308\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=39308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=39308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=39308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}