National Infrastructure Vulnerability
Nation Infrastructure
This report covers how the United States does and should address threats to its critical national infrastructure. Vulnerability to attacks like the SCADA/Stuxnet worm will be addressed as well as mitigations as they relate to the seven domains. The assessment of levels of responsibility to protect both the public and private sectors will be covered as well as the elements of an effective IT security policy framework. No less than three scholarly resources will be used for this report, as per the parameters of the assignment.
SCADA/Stuxnet
The Stuxnet word made major shockwaves when it came to be known fully in roughly 2010. Presumed by many to be the product of cooperation with the Israeli and United States governments to attack Iran and perhaps inhibit their ability to manufacture and process nuclear devices and materials, the worm specifically attacks Siemens (SCADA) devices that relate to the data management of infrastructure devices. While this attack was clearly targeted at Iran, such a methodology and attack could certainly be turned around and used against the United States and/or other Western nations and this would obviously have horrible effects (Goodin, 2010).
Mitigations across the Seven Domains
The seven domains of IT infrastructure must be managed by the government to protect both the public and private sector. These seven domains...
DHS and the NPR The National Preparedness Report was structured in a strategic manner by the Department of Homeland Security (DHS). There was a great deal of scrutiny and assessment which occurred when this report was put together as much of it represented the most recent work of DHS, their theories, objectives and recent discoveries. Thus, the structure of the report was incredibly important. One aspect of the report appears to be
U.S. National Strategy What three United States national interests do you think will be at great risk over the next five years? Describe those interests and identify which instruments of national power can be leveraged to protect or advance those national interests and how those instruments can be used. As President Obama stated in his addresses to Congress in February 2009, the most important problem that the country faced was the economy,
Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning
Seaports Vulnerability to Submersible Vessels Criminology All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous attacks on the borders including dry ports and seaports. In America, it is a severe issue to understand how to secure and protect the seaports of the country. The topic of discussion is also related
Preventing Terrorist Attacks on the Water and Wastewater Systems Sector Terrorism is nowadays an already established threat that is part of every security strategy of modern states. It is not only an un-conventional threat at the address of national security but also it drove the re-definition of the term of security as it was understood and worked with some twenty years ago. Currently, there is talk about economic, political, social security
S.A. PATRIOT Act Improvement and Reauthorization Act reauthorized all expiring provisions of the U.S.A. PATRIOT Act, added dozens of additional safeguards to protect privacy interests and civil liberties, and strengthened port security. (USDOJ, 2008) SUMMARY & CONCLUSION This report has presented in brief the federal policy changes that been changed or created since the events of September 11, 2001. Changes have included collaboration between federal, state and local agencies in coordination and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now