When managing an emergency such as a cyber attack, planners must first assess the risks associated with a cyber attack, analyze the risk of a cyber attack, develop strategies to mitigate that risk, evaluate strategies, and implement and monitor current plans. This process expresses the five characteristics of effective risk assessment planning. Society relies upon many forms of …show more content…
However, the expense for maintaining and increasing cyber security and cyber security awareness has cost the federal government approximately $459 million since 2012 (Department of Homeland Security, 2011). This figure could eventually increase as newer technology is released and developed, but it is evident how serious cyber security must be taken to ensure the safeguard of information and the proper mitigation of a cyber attack. The monitoring of cyber attacks, as previously mentioned, involves many entities working collaboratively to stonewall cyber attacks from occurring. When implementing measures, agencies have to recognize a legitimate threat exists and if the threat is imminent in order to stop the