Begin Main Content Area

Cyber Security

Are you Safe Online?

Both individual users and businesses need to follow cybersecurity tips. Equip computers with updated security software. If appropriate, have systems checked over by a qualified computer technician. Be informed about the trends in cybercrime and how to avoid attacks.

Framework for Improving Critical Infrastructure Cybersecurity

The national and economic security of the U.S. depends on the reliable functioning of critical infrastructure. Executive Order 13636 directed NIST to develop a plan to protect critical infrastructure.

NIST released Framework for Improving Critical Infrastructure Cybersecurity in February 2014. It is a collaboration between industry and government. The framework consists of standards, guidelines, and practices to protect critical infrastructure. This flexible, repeatable, and cost-effective approach helps owners and operators manage cybersecurity risks.

The C³ Voluntary Program helps critical infrastructure owners and operators to:

  • Align with existing resources to adopt the Cybersecurity Framework
  • Manage cyber risks

The NIST-issued Roadmap discusses next steps. It identifies key areas of cybersecurity development, alignment, and collaboration. 

NIST continues to receive and consider informal feedback about the Framework and Roadmap. Send observations, suggestions, and lessons learned to cyberframework@nist.gov.

PA Office of Administration/Office for Information Technology (OA/OIT) Security Policies

OA/OIT established policies and procedures for agencies under the Governor's jurisdiction to:

  • Help standardize activities among the agencies
  • Promote collaboration among the agencies
  • Increase efficiency and lower associated costs.

For more information please visit the OA/OIT Security Website and Security Policies.

Continuity Planning

Every organization should have a robust continuity of operations plan. It ensures ongoing essential functions in case of: 

  • Natural disasters
  • Accidents
  • Technological emergencies
  • Terrorist attack-related incidents

Continuity Planning resources:

DHS Critical Infrastructure Cyber Community (C3) Voluntary Program

The C3 program is a public-private partnership to help manage cyber risks. It connects

  • Businesses
  • Federal government agencies
  • Academia
  • Governments (state, local, tribal, territorial)

to the U.S. Department of Homeland Security and other Federal government programs and resources. It also assists in the use of the NIST Cybersecurity Framework.

DHS CSET - Department of Homeland Security Cyber Security Evaluation Tool

The Cyber Security Evaluation Tool (CSET®) is desktop or laptop software. It evaluates the cybersecurity of an automated, industrial control or business system. Using a hybrid risk and standards-based approach, it provides relevant recommendations for improvement.  The DHS Control Systems Security Program (CSSP) developed the CSET application. CSET is available through the United States Computer Emergency Readiness Team's (US-CERT) website.

How it Works

CSET helps asset owners assess their information and operational systems cybersecurity practices. It uses a series of detailed questions about:

  • system components and architecture
  • operational policies and procedures.

CSET then provides a prioritized list of recommendations, including:

  • Solutions
  • Common practices
  • Compensating actions
  • Component enhancements or additions.
Getting Started

Get started by downloading CSET. To learn more about CSET or to request a CD copy of the software, contact cset@dhs.gov. For general program questions or comments, contact cssp@dhs.gov or visit www.us-cert.gov/control_systems.

National Information Sharing & Analysis Centers (ISACs)

ISACs help critical infrastructure owners and operators protect their facilities, personnel and customers. They help guard against cyber or physical security threats and other hazards. ISACs collect, analyze and disseminate actionable threat information. They provide members with tools to mitigate risks and enhance resiliency. ISACs reach deep into their sectors. They communicate critical information and maintain sector-wide situational awareness.

National Information Sharing & Analysis Centers:

  • Automotive ISAC
  • Aviation ISAC
  • Communication ISAC
  • Defense Industrial Base ISAC
  • Defense Security Information Exchange
  • Downstream National Gas ISAC
  • Electricity ISAC
  • Emergency Management & Response ISAC
  • Financial Services ISAC
  • Heathcare Ready
  • Information Technology ISAC
  • Maritime ISAC
  • Multi-State ISAC
  • National Health ISAC
  • Oil & Natural Gas ISAC
  • Real Estate ISAC
  • Research & Education ISAC
  • Retail Cyber Intelligence Sharing Center
  • Supply Chain ISAC
  • Surface Transportation, Public Transportation & Over-the-Road ISAC
  • Water ISAC

Reporting Cyber Crime and Other Resources

A Unified Message for Reporting Message for Reporting to the Federal Government

This fact sheet, Cyber Incident Reporting:  A Unified Message for Reporting to the Federal Government, explains when, what, and how to report a cyber incident to the federal government.

Law Enforcement Cyber Incident Reporting Unified Message

The U.S. Department of Homeland Security, the Federal Bureau of Investigation, and the International Association of Chiefs of Police, in partnership with law enforcement agencies across the country, have released the Law Enforcement Cyber Incident Reporting Unified Message. This document details different ways law enforcement partners can report suspected or confirmed cyber incidents to the federal government. The Unified Message can be viewed in the Law Enforcement Cyber Incident Reporting section of http://www.dhs.gov/combat-cyber-crime.

Federal Bureau of Investigation (FBI)

The FBI Cyber Division heads national efforts to investigate and prosecute internet crimes, including cyber based terrorism, espionage, computer intrusions and major cyber fraud.  This division works through the National Cyber Investigative Joint Task Force (NCIJTF) and cyber investigative squads in each FBI field office. FBI – Cyber Crime Website

Department of Homeland Security – Combating Cyber Crimes

DHA components such as the U.S. Secret Service and U.S. Immigrations and Customs Enforcement have special divisions dedicated to fighting  cyber crime.  DHS – Combating CyberCrime Website

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) works to reduce risks within and across all critical infrastructure sectors by partnering with law enforcement agencies and the intelligence community and coordinating efforts among Federal, state, local, and tribal governments and control systems owners, operators, and vendors. Additionally, ICS-CERT collaborates with international and private sector Computer Emergency Response Teams (CERTs) to share control systems-related security incidents and mitigation measures. ICS-CERT Website

Federal Communication Commission Small Business Cyber Planner

The Small Biz Cyber Planner is available at FCC' s Cyberplanner.

US Computer Emergency Readiness Team (US-CERT)

Cyber Incident Reporting - US CERT is responsible for analyzing and reducing cyber threats and vulnerabilities, disseminating cyber threat warning information, and coordinating incident response activities.  It is 24-hour operational arm of the DHS National Cyber Security Division (NCSD).  If you need to report an incident to US CERT, go to U.S. CERT Cyber Incident Reporting.