Tuesday, May 19, 2020
Critical Infrastructure Protection - 1106 Words
Introduction When it comes to protecting an infrastructure, careful planning and coordination needs to take place. Protecting an infrastructure takes an important security initiative called Critical Infrastructure Protection (CIP). The United States critical infrastructure is protected by the Department of Homeland Security. Examine three areas of the Department of Homeland Security: mission, operations and responsibilities The first area is the Department of Homeland Securityââ¬â¢s mission. The Department of Homeland Security (DHS) was created in 2002 by the Homeland Security Act. In 2003 the DHS started their operations. The DHS primary responsibilities and objectives includes prevention, protection, and response to issues that threatenâ⬠¦show more contentâ⬠¦No matter how hard you try or the efforts placed on prevention, no one can stop or prevent a natural disaster from causing damage to computer systems, downtime, and damage or disruption to other essential services. The only thing that ca help you with a natural disaster is to have recovery and contingency plans in place. The most unpredictable and dangerous attack comes from human threats. This can especially be damaging when it comes from someone in the inside, because they know what the security measures are and other protective measures that might be in place. An attack from an insider is hard to prevent because they have been given legitimate access to systems, they are most familiar with the computers and applications, and they will know how to cause damage. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.ââ¬â¢s critical infrastructure When evaluating the effectiveness of an IS professional in relation to protecting our nations critical infrastructure, issue arise from the outdated government regulation. Most of the efforts are non-effective because the government is trying to use 19th century solutions for 21st century problems. There are many regulations that are put into place but the difficulty comes when trying to change or remove the regulation that is currently in place. The direct result of slow regulation change is that cybersecurity regulations are already outdated before they are releases. The federalShow MoreRelatedEssay about Assignment 2: Critical Infrastructure Protection1280 Words à |à 6 Pages Assignment 2: Critical Infrastructure Protection Eustace LangleyCIS 502 May-23-2013 Facilitator: Dr. Gideon U. Nwatu Strayer University Critical Infrastructure Protection Introduction The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure (The White House Office of the Press Secretary, February 2013). It is imperative for every nationRead MoreA Critical Infrastructure Protection Is Not Just A National Issue But Also A Global Responsibility816 Words à |à 4 Pages EDM: Case Four Name Institutional Affiliations Introduction Critical Infrastructure Protection is not just a national issue but also a global responsibility. Perl Report introduces the importance of International Cooperation. The accrued benefits increase the desired need to form agreements between nations to share necessary scientific knowledge helpful in mitigating vulnerability. For example, the agreement between German and Homeland Security of the United States provides collaborativeRead MoreCritical Infrastructure Protection1140 Words à |à 5 Pagesï » ¿Critical Infrastructure Protection Introduction The importance of protecting the U.S. national infrastructure cannot be overstated. The protection of critical infrastructure is â⬠¦essential to the nations security, public health and safety, economic vitality, and way of life, according to the National Infrastructure Protection Plan (NIPP). This paper delves into the mission and responsibilities of the U.S. Department of Homeland Security, and references other sources related to infrastructureRead MoreCritical Infrastructure Protection ( Cip )898 Words à |à 4 PagesAmerican Transmission Corporation, WI. Dec ââ¬Ë14 ââ¬â Oct ââ¬Ë15 Critical Infrastructure Protection (CIP) Consultant â⬠¢ Responsible for ensuring ATCââ¬â¢s ability to remain compliant with NERC CIP standards, working with functional area teams to ensure that they have the necessary information to ensure compliance. â⬠¢ Lead project for Role based training with functional areas to develop content in support for CIP requirements. â⬠¢ Support the development and roll out of Core CIP training requirements. â⬠¢ WorkedRead MoreA Computational Asset Vulnerability Model For The Strategic Protection Of The Critical Infrastructure1485 Words à |à 6 PagesA Critical Review of ââ¬Å"A Computational Asset Vulnerability Model for the Strategic Protection of the Critical Infrastructureâ⬠Article Summary of the Article A brief background of this article shows that it presents the doctoral works of Richard White on security under the supervision of Terrance Boult and Edward Chow. The article was published online by the ââ¬Å"International Journal of Critical Infrastructure Protection.â⬠In this paper, Richard White present a new computational model that can be ofRead MoreHomeland Security And Homeland Defense1321 Words à |à 6 Pageswell as covering their missions/goals, tasks, duties, and responsibilities. In addition, a section of this paper is the assessment of the critical infrastructure protection programs of the U.S. The assessment will also include the overall capability of the nationââ¬â¢s critical infrastructure protection program to ensure the survivability of its critical infrastructure. Homeland Security There are numerous definitions of homeland security. The definitions can create confusion on what homeland securityRead MoreHomeland Security And Homeland Terrorism1206 Words à |à 5 Pageshomeland defense are different, but both can assist each other in certain aspects. The following paragraphs will compose of accurate definitions regarding homeland security, homeland defense and in end will discuss an in depth summary of the critical infrastructure program. These mentioned areas each have a requirement to be treated as specific in nature in order to not sacrifice their specific definition. Homeland Security ââ¬Å"Homeland security is focused on terrorism in the United Statesâ⬠¦TerroristsRead MoreTerrorism And The Homeland Security1511 Words à |à 7 Pagesto do many things throughout the United States, and the main topic that Iââ¬â¢m going to focus on will be preventing terrorist attacks, preventing the use of major biological, chemical, radiological, and nuclear weapons, and managing risk to critical infrastructures. The first part of preventing terrorism is to understand the threat. The main part of understanding the threat is to try to find out everything you can about what is happening, when itââ¬â¢s happening and where. So Homeland Security willRead MoreComponents Of Energy Supply Chain1383 Words à |à 6 Pagescomponents including energy commodity, network services, and retail services. Energy commodity refers to the examples of available energy sources in the economy. The USA relies on petroleum, gas and electricity power sources to drive the other critical infrastructures. The authorities oversee the distribution of power using secure network services. The interconnected supply channels of power involve extracting energy from production and storage points for the purpose of sharing it among end users. AlsoRead MoreCyber Security Breach : Thesis Statement1696 Words à |à 7 Pagesoffenders valuable insights to leverage their wrongful intention. Nevertheless, the most detrimental form of attack are the ones directed at corporations responsible for maintaining critical infrastructures of a country such as power grid, nuclear facility, and public transportation. Any one of these infrastructures going under siege would create inconsiderable economical and existential crisis threatening the countryââ¬â¢s stability, welfare, and future. In order to deal with ever encroaching threats
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.