Verified Document

National Infrastructure Vulnerability Nation Infrastructure This Report Essay

National Infrastructure Vulnerability Nation Infrastructure

This report covers how the United States does and should address threats to its critical national infrastructure. Vulnerability to attacks like the SCADA/Stuxnet worm will be addressed as well as mitigations as they relate to the seven domains. The assessment of levels of responsibility to protect both the public and private sectors will be covered as well as the elements of an effective IT security policy framework. No less than three scholarly resources will be used for this report, as per the parameters of the assignment.

SCADA/Stuxnet

The Stuxnet word made major shockwaves when it came to be known fully in roughly 2010. Presumed by many to be the product of cooperation with the Israeli and United States governments to attack Iran and perhaps inhibit their ability to manufacture and process nuclear devices and materials, the worm specifically attacks Siemens (SCADA) devices that relate to the data management of infrastructure devices. While this attack was clearly targeted at Iran, such a methodology and attack could certainly be turned around and used against the United States and/or other Western nations and this would obviously have horrible effects (Goodin, 2010).

Mitigations across the Seven Domains

The seven domains of IT infrastructure must be managed by the government to protect both the public and private sector. These seven domains...

There are two basic elements that can be used to fight attacks from computer viruses, other malware, social engineering and computer worms like Stuxnet and other more common viruses and worms. Those two tools are user education and deployment of security solutions. Not all solutions are obvious. An established antivirus and anti-malware system across all domains is a must, of course (UMW, 2013).
However, the increase and ferocity from tactics such as social engineering, user carelessness and the like can be very problematic as well. Examples of social engineering would be criminals using social tactics and ploys to get information that they cannot or should not have. User carelessness includes losing of laptops and other important equipment, leaving workstations unsecured and so forth. Users must be educated on what to do, what not to do and users must be disciplined if they screw up. Lastly, users must be protected from themselves via tactics like laptop encryption, idle timer lockouts and so on (UMW, 2013).

Responsibility Assessment

As far as how to assess levels of responsibility to protect the public and private sector, that can also be broken into two major parts. The high-level IT personnel as well as the agency executives themselves need to construct the best practices, best prevention…

Sources used in this document:
References

Goodin, D. (2010, September 22). SCADA worm a 'nation state search-and-destroy weapon'. The Register. The Register: Sci/Tech News for the World. Retrieved May 18, 2013, from http://www.theregister.co.uk/2010/09/22/stuxnet_

worm_weapon/

Taylor, L. (2001, February 16). Seven elements of highly effective security policies |

ZDNet. ZDNet | Technology News, Analysis, Comments and Product Reviews for IT Professionals. Retrieved May 18, 2013,from http://www.zdnet.com/news / seven-elements-of-highly-effective-security-policies/297286
Cite this Document:
Copy Bibliography Citation

Related Documents

National Preparedness Report
Words: 972 Length: 3 Document Type: Essay

DHS and the NPR The National Preparedness Report was structured in a strategic manner by the Department of Homeland Security (DHS). There was a great deal of scrutiny and assessment which occurred when this report was put together as much of it represented the most recent work of DHS, their theories, objectives and recent discoveries. Thus, the structure of the report was incredibly important. One aspect of the report appears to be

U.S. National Strategy What Three United States
Words: 4520 Length: 16 Document Type: Essay

U.S. National Strategy What three United States national interests do you think will be at great risk over the next five years? Describe those interests and identify which instruments of national power can be leveraged to protect or advance those national interests and how those instruments can be used. As President Obama stated in his addresses to Congress in February 2009, the most important problem that the country faced was the economy,

Iran Country Assessment Vulnerability Assessment
Words: 1513 Length: 4 Document Type: Research Paper

Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning

Seaports Vulnerability to Submersible Vessels
Words: 3918 Length: 12 Document Type: Research Paper

Seaports Vulnerability to Submersible Vessels Criminology All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous attacks on the borders including dry ports and seaports. In America, it is a severe issue to understand how to secure and protect the seaports of the country. The topic of discussion is also related

Preventing Terrorist Attacks on the Water and Wastewater Systems...
Words: 2251 Length: 7 Document Type: Research Paper

Preventing Terrorist Attacks on the Water and Wastewater Systems Sector Terrorism is nowadays an already established threat that is part of every security strategy of modern states. It is not only an un-conventional threat at the address of national security but also it drove the re-definition of the term of security as it was understood and worked with some twenty years ago. Currently, there is talk about economic, political, social security

Terrorism and Policy: An Examination
Words: 1564 Length: 5 Document Type: Thesis

S.A. PATRIOT Act Improvement and Reauthorization Act reauthorized all expiring provisions of the U.S.A. PATRIOT Act, added dozens of additional safeguards to protect privacy interests and civil liberties, and strengthened port security. (USDOJ, 2008) SUMMARY & CONCLUSION This report has presented in brief the federal policy changes that been changed or created since the events of September 11, 2001. Changes have included collaboration between federal, state and local agencies in coordination and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now