Last Updated on September 21, 2022 by Admin
The President and Crisis Management
Today is your presidential Inauguration Day. You were elected as president last November by a slim margin in both the popular vote and the electoral vote. You attended a worship service this morning with your family and about a dozen high-ranking members of the U.S. House and the U.S. Senate. Then, you and the current president took a ride in a convertible car to the U.S. Capitol, where you were sworn in as the new president of the United States. It is now official; you are the president!
As you and your family are enjoying the parade, your new chief of staff and one of the key military advisors who is a member of the Joint Chiefs of Staff whispers to you that there has been a major cyberattack on key federal financial institutions across the United States that compromised the personal financial data and passwords of hundreds of thousands of citizens.
Even though you have held office for just a few hours, you know it is critical to act swiftly and decisively so that the perpetrators of the crime, the American citizens, and political leaders (those who support you and those who do not) see you as a competent and strong leader. What are your first three actions?
In your paper, you will describe these three actions in detail. Organization is important in this paper. Make certain to include the following information in your paper, and organize major sections using headings.
- Briefly describe the cyberattack and its implications for the nation.
- What is your first action?
- What is your second action?
- What is your third action?
- Provide a conclusion.
Your paper must be 2–4 pages in length, not counting the title page and references page. Make certain to double-space, apply 1-inch margins, and use 12-point font. Utilize headings to separate major sections of your plan (e.g., First Action, Section Action). Cite all sources in-text and on the references page using APA Style.
Expert Answer and Explanation
The President and Crisis Management
Description of the Cyber-attack and its Implications for the Nation
In the past few years, there has been an increased frequency and complexity of cyber-attacks on financial institutions, which often have far-reaching consequences. Such attacks can not only bring about national instability, but can be causes of instability at international level. As a newly inaugurated president, a key military advisor informs me about a major cyber-attack on various federal institutions across the US, where the financial information of thousands of citizens have been compromised. This kind of attack could only happen on the inauguration day for political reasons, possibly to test my ability to react to crisis (Brunner, 2016). As a president, there are different ways in which I would interpret the situation and build affirmative action to prevent damage from the attack.
In the first action, I would recruit an emergency response committee which would help to figure out the extent nature and spread of the attack. A problem can only be solved efficiently if it is understood well (Peng et al., 2018). Jumping into action without proper analysis would be employment of superficial actions on a problem that could have deeper routes. It would give the attackers a chance for them to regain their forces and launch even greater attacks. The committee would be comprised of individuals who have a background in IT, and those who have previously been involved in solving hacking issues, and who are certified ethical hackers. By identifying the extent of the problem, it would be possible to figure out the attackers, which would be a big milestone in solving the entire cyber-attack issue.
The second course of action would involve freezing the accounts of the individuals who were the primary victims of the attack. It is likely that some of the institutions and individuals who were victims of the attack are still unaware of the state of the account, and so I would launch a campaign in which people would assess the status of their financial accounts, and report any suspicious activities to the relevant authorities (Iwendi et al., 2020). After the identification of these accounts, they would all be frozen, as an attempt to avoid further damage by the attackers. This second action would require collaboration with many other players in the financial sector, hence the need for the campaign.
The third course of action would be arresting and prosecuting the perpetrators of the action. While it may be hard to reach the individuals who did such actions, the criminal investigation police are less likely to fail in such a quest, especially with all the support they would get from the government (Mahmoud, Hamdan, & Baroudi, 2019). I would ensure that the punishment given to the individuals is not only severe, but is made public, so as to scare away other individuals who may have thoughts of being involved in such an action.
The president is tasked with many roles of managing cybercrimes, and these largely involve the coordination of the responsible teams. Forming an emergency response committee would help in understanding the nature of the problem and the extent to which it has spread. The performers of such actions should be prosecuted in public so that other potential attackers would be scared away, and also the financial institutions would exercise a higher level of security.
Brunner, J. A. (2016). The (Cyber) New Normal: Dissecting President Obama’s Cyber National Emergency. Jurimetrics, 57, 397.
Iwendi, C., Jalil, Z., Javed, A. R., Reddy, T., Kaluri, R., Srivastava, G., & Jo, O. (2020). KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks. IEEE Access, 8, 72650-72660.
Mahmoud, M. S., Hamdan, M. M., & Baroudi, U. A. (2019). Modeling and control of cyber-physical systems subject to cyber-attacks: a survey of recent advances and challenges. Neurocomputing, 338, 101-115.
Peng, C., Sun, H., Yang, M., & Wang, Y. L. (2019). A survey on security communication and control for smart grids under malicious cyber-attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49(8), 1554-1569.