An Overview of the Federal Cybersecurity Plan and Attack Rating System

BY:

Oct 6, 2016

an-overview-of-the-federal-cybersecurity-plan-and-attack-rating-system

The White House unveils new cybersecurity measures

This February, the White House unveiled a new cybersecurity directive intended to help protect citizens, businesses, and government agencies against digital attacks. The plan assigns specific responsibilities to each federal agency in the case of a cyberattack, and rates the severity of cyber threats on a scale from 0-5 in magnitude. Keep reading to learn more about the plan, and how it could help protect your business from an ever-increasing threat.

Three efforts, three agencies

The new directive establishes three separate lines of effort for combating cybersecurity threats and assigns a specific agency for each effort:

  • The Department of Justice (acting through the FBI and National Cyber Investigative Joint Task Force) will be responsible for investigation and directly pursuing the threat.
  • The Department of Homeland Security (acting through the National Cybersecurity and Communications Integration Center) will help determine a risk profile for the incident, trying to determine what U.S. businesses, individuals, or government agencies might be vulnerable to attack, the type and potential consequences of the threats against them, and how best to protect them.
  • The Office of the Director of National Intelligence (working through the Cyber Threat Intelligence Integration Center) is responsible for intelligence gathering, research, and supporting other agencies by discovering gaps in knowledge about current and future cyber threats.

The attack rating scale

The White House’s attack rating scale goes from 1-5, and the new directives won’t kick in until a threat is rated three or above on the scale. Here’s how it ranks potential cyber threats:

  • Level 0: Baseline (white): “Unsubstantiated or inconsequential event.”
  • Level 1: Low (green): “Unlikely to impact public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence.”
  • Level 2: Medium (yellow): “May impact public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence.”
  • Level 3: High (orange): “Likely to result in demonstrable impact to public health or safety, economic security, foreign relations, civil liberties, or public confidence.”
  • Level 4: Severe (red): “Likely to result in a significant impact to public health or safety, national security, foreign relations, or civil liberties.”
  • Level 5: Emergency (black): “Poses an imminent threat to the provision of wide-scale critical infrastructure services, national gov’t stability, or to the lives of U.S. persons.”

Lower-scale threats include minor nuisances, denial-of-service (DoS) attacks, digital defacement, or committing financial crimes. Medium-to-high scale threats involve stealing sensitive information, denying availability to a key system or service, and corrupting or destroying data. Severe and emergency threats include damaging computer or networking hardware and causing other physical consequences.

How will this affect the average business owner?

As of now, the effect on individual Americans, including business owners and executives, is most likely low. However, as the number of threats against U.S. businesses is only increasing, a more effective system of teamwork and cooperation between government agencies should result in a better and faster response to cyber threats affecting businesses in the near-future.

If you want to learn more about securing your cloud-based operations and protecting your business from cyber threats, contact CloudHesive at 800-860-2040 or contact us through our online form.

Related Blogs

  • By connecting customer data across your organization, Wisdom allows agents to provide the best in customer service." alt="">
    An In-Depth Look at Amazon Connect Wisdom

    Amazon Connect Wisdom brings disparate data together to quickly provide the information your service agents need Key Takeaways: Consumers expect speedy and personalized customer service Wisdom uses...

    Learn More
  • Amazon Connect makes it simple to set up remote contact center agents." alt="">
    Set Up Remote Contact Center Agents Quickly with Amazon Connect

    Here’s how to set up a fully operational contact center that can be accessed from nearly anywhere. Key Takeaways: Amazon Connect lets your business set up a contact center that agents can...

    Learn More
  • When a specified alarm state is reached, the system automatically creates an OpsItem in OpsCenter." alt="">
    Create an Automatic OpsItem When CloudWatch Alarm Enters an Alarm State

    Auto-generated OpsItems give detailed information about the alarm for swift remediation. Key Takeaways: The auto-generated OpsItem offers aggregated information that makes alarm investigation easy...

    Learn More