Critical Infrastructure Protection Using Computers In Modern Society Essay

PAGES
2
WORDS
693
Cite

Critical Infrastructure Protection Nowadays, computers have become very ubiquitous in the American society. Computers and related technologies are used at every level of government in the United States. Computer technologies are also used by all sorts of professionals, and private citizens to access information, store information, communicate, and/ or transform acquired information. Right now, there are also computer-dependent technologies that are used to monitor and control, critical transportation systems, water treatment and distribution systems, power grids, gas distribution systems, and oil transport systems. Moreover, virtually all aircrafts are guided by GPS (Global Positioning System), and other computer-linked/ related systems. From the above-made statements, it is clear that there is a need for coordinated security systems to protect critical computer systems that are keeping the world moving. This means there is a strong need for cooperation among stakeholders for the successful protection of critical infrastructure.

According to the Department of Justice, any unpermitted intrusion into a critical national security system by an individual or a group of individuals is a crime (Sharp, 1998). It is the responsibility of all levels of governments in the United States to prevent unauthorized intrusion into critical systems. Critical infrastructure security is therefore the responsibility of all stakeholders. There...

...

The initiatives are aimed at ensuring that relevant agencies, local and state governments, and private actors share critical information and cooperate effectively. There are three main principles that guide the prevention initiatives in the United States. They are:
(1) Engaged Partnerships: The prevention of attacks on critical infrastructure is a shared responsibility among all levels of government, security agencies, private agencies, private citizens, and global partners. Every stakeholder has to play an important role in building prevention capacity, developing prevention plans, and in preparing adequately for possible attacks on important infrastructure.

(2) Scalability, Adaptability, and Flexibility: Core prevention capabilities should be scalable, adaptable, and flexible enough to address emerging terrorist threats. This is important for the prevention capabilities to continue being relevant as threats continue evolving.

(3) Readiness to Act: This is perhaps the most important principle. Identified threats ought to be immediately neutralized in an organized and pre-planned manner by all partners involved in terrorism prevention (Homeland Security, 2016).

The evolving nature of physical and cyber threats in the US have blurred the boundaries between public and private…

Cite this Document:

"Critical Infrastructure Protection Using Computers In Modern Society" (2018, September 28) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/critical-infrastructure-protection-using-computers-in-modern-society-essay-2172853

"Critical Infrastructure Protection Using Computers In Modern Society" 28 September 2018. Web.27 April. 2024. <
https://www.paperdue.com/essay/critical-infrastructure-protection-using-computers-in-modern-society-essay-2172853>

"Critical Infrastructure Protection Using Computers In Modern Society", 28 September 2018, Accessed.27 April. 2024,
https://www.paperdue.com/essay/critical-infrastructure-protection-using-computers-in-modern-society-essay-2172853

Related Documents

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 A qualitative content analysis will be conducted to explore the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. Qualitative analysis involves obtained

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 This research proposal explores the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. First, nuclear energy is declining in its share of

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 This research proposal explores the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. First, nuclear energy is declining in its share of