StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security and the National Infrastructure - Case Study Example

Cite this document
Summary
To start with, the United States energy infrastructure strengths the international financial system of the twenty-first century. In fact, in the absence of a secure energy supply, welfare and health sectors are under danger and the United States financial system is not able to work properly…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Information Security and the National Infrastructure
Read Text Preview

Extract of sample "Information Security and the National Infrastructure"

Case Study 2: Information Security and the National InfrastructureThe United States energy infrastructure strengths the international financial system of the twenty first century. In fact, in the absence of a secure energy supply, welfare and health sectors are under danger and the United States financial system is not able to work properly. Additionally, more than 80% of the nation’s energy infrastructure is possessed by the nation’s private sector (IDAHO, 2010).In the past few years, the security issues and vulnerabilities regarding digital systems and networks have increased exponentially, as the public responsiveness has not kept up by those innovative dangers and vulnerabilities in the Internet based cyberspace.

However, these risks and dangers can influence all regions of public and private life, global and national companies and even security strategies of national states or international businesses similar to the OSCE. In the very old resist among defender and attacker, the attacker above ever comes into view to have the benefits by being well armed, generously deciding the strength of the attack and the target and without constraints of geographical distances and frontiers (European Academy, 2012; Eckert, 2010).

In addition, the Federal Government administrator has approved actions against security and vulnerability based issues which have become more and more critical for national infrastructure in the United States began by the PDD (Presidential Decision Directive/NSC-63) on CIP (Critical Infrastructure Protection), approved by Bill Clinton in 1988. Additionally, the managerial synopses of those directives involve the protection of national natural resources for better corporate management and handling (Dixon, 2010; European Commission, 2012; Tabansky, 2011).

Moreover, national critical infrastructures are based on cyber or physical systems that are essential to the lowest processes of the financial and government departments. In this scenario, these departments comprise, however are not limited to, energy, telecommunications, finance, banking, water, transportation and emergency systems and services; in cooperation with private and government. Additionally, the majority of nation’s important infrastructures have traditionally been logically and physically detached systems that had small mutual dependence.

However, in result of advancements in information technology and the need of increased performance, these arrangements have turned out to be more and more interlinked and automated. On the other hand, these innovations and developments have also created a wide variety of vulnerabilities in the forms of technology based system failure, weather, human error and other natural reasons, and cyber and physical security based attacks. Hence, tackling these issues and vulnerabilities will essentially need flexible, evolutionary methods that consider both the private and public sectors, and secure both global and domestic security (Dixon, 2010; European Commission, 2012; Tabansky, 2011).

Furthermore, processing and acquisition jobs are two important aspects of Supervisory Control and Data Acquisition System (SCADA). Through this system, control centers are capable of recognizing and repairing technology based interferences, in an attempt to develop the essential measures of technology based systems repair centrally and to have data relevant for planning and further accomplishments. Historically, every power plant had its own technology management security control center linked with others’ decisions of corporate networks.

Hence, such initiatives can ensure the effective security and privacy management of the corporation (Umbach, 2010; Dallaway, 2009). ReferencesDallaway, E. (2009, June 29). Using Information Security to Protect Critical National Infrastructure: Energy Sector is Hackers’ Biggest Target. Retrieved October 22, 2012, from http://www.infosecurity-magazine.com/view/2310/using-information-security-to-protect-critical-national-infrastructure-energy-sector-is-hackers-biggest-target-/Dixon, M. (2010, July 13).

Information Security in the Oil and Gas Critical Infrastructure Protection (CIP) Sectors. Retrieved October 24, 2012, from http://www.discoveringidentity.com/2010/07/13/information-security-in-the-oil-and-gas-critical-infrastructure-protection-cip-sectors/Eckert, S. (2010). Protecting Critical Infrastructure: The Role of the Private Sector. Retrieved October 24, 2012, from http://www.ridgway.pitt.edu/LinkClick.aspx?fileticket=Bezaq7AdjxA%3D&tabid=233European Academy. (2012, September 28). Brochure National Critical Energy Infrastructure Protection in Europe.

Retrieved October 23, 2012, from http://www.euroakad.eu/fileadmin/user_upload/dateien/seminars/National_Critical_Energy_Infrastructure_Protection_in_Europe_DM.pdfEuropean Commission. (2012). Energy infrastructure. Retrieved October 22, 2012, from http://ec.europa.eu/energy/infrastructure/critical_en.htmIDAHO. (2010). National Infrastructure Protection Plan Energy Sector. Retrieved October 22, 2012, from http://www.bhs.idaho.gov/Pages/Plans/CIKR/Energy.pdfTabansky, L. (2011). Critical Infrastructure Protection against Cyber Threats.

Retrieved October 22, 2012, from http://www.inss.org.il/upload/(FILE)1326273687.pdfUmbach, F. (2010). Critical Energy Infrastructure Protection in the Electricity and Gas Industries – Coping with Cyber Threats to Energy Control Centers. Retrieved October 23, 2012, from hawk.ethz.ch/./Critical_Energy_Infrastr_Umbach_Au10.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security and the National Infrastructure Case Study”, n.d.)
Information Security and the National Infrastructure Case Study. Retrieved from https://studentshare.org/politics/1785178-information-security-and-the-national-infrastructure
(Information Security and the National Infrastructure Case Study)
Information Security and the National Infrastructure Case Study. https://studentshare.org/politics/1785178-information-security-and-the-national-infrastructure.
“Information Security and the National Infrastructure Case Study”, n.d. https://studentshare.org/politics/1785178-information-security-and-the-national-infrastructure.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security and the National Infrastructure

Form of Technological Abuse

The first being the basic fact that the internet economy highly dependent on information and network security and that direct damage caused by internet security incidents is approximately tens of billions of US dollars per year for the U.... Q: Return to the discussion of how spam has or has not changed the infrastructure.... My perspective has greatly changed when I look at the effect that spam has had on the infrastructure of technology.... hellip; Spam, spyware, identity and data theft are a form of technological abuse that have brought along noticeable shifts in the technological infrastructure....
2 Pages (500 words) Essay

Governance Styles in Use at Richter

It is seen that the major large organizations are able to increase efficiencies of their production processes and materials management processes through the implementation of IT infrastructure.... Business Table of Contents Value if IT to Richter 3 Governance styles in use at Richter 4 Szucs' future strategies 5 Present IT structure against growing demands of the organization 5 Degree of central control over IT affiliates 6 Reference 8 Value if IT to Richter The major transformation of the company Richter can be attributed to the contribution of information and technology....
4 Pages (1000 words) Essay

The Issue of Redundancies Plus Backup Systems that Reduce Risk Occurrence in the Dam Sector

The Homeland Security Presidential Directive 7 (HSPD-7) has ensured the presence of a national infrastructure Plan (NIPP) leading to development plus improvement of backup systems (McGrath, 2011).... nbsp;… Critical infrastructure and Key Resources (CIKR) entails systems plus assets occurring physically or virtually.... The infrastructure is fundamental because its destruction would lead to deteriorated state economy (McGrath, 2011).... Destruction would compromise the security of the nation in terms of safety or health....
1 Pages (250 words) Assignment

Information Technology Technologies in the Provision of Clinical HealthCare

The government is justified in telling the private sector how to enhance or improve cyber security because there is urgent need to protect and secure our processors/computers , financial institutions, confidential information on national security and other significant aspects of the governments infrastructure (Heiman, 2003).... In addition, cyber security is important to the functioning of safety essential systems like response to an emergency and to the guard of government's infrastructure systems....
2 Pages (500 words) Essay

How the tiger got his stripes

The Department of the Homeland Security (DHS) and the national infrastructure Protection Plan (NIPP) play a critical role in protecting the private sector as well as the nation's critical infrastructure.... Moreover, it develops sound concepts that are relevant to the private sector and the critical infrastructure, making sure to address the cyber, human, and physical considerations that are paramount in the adoption of rational and comprehensive programs (Scheuer, n....
3 Pages (750 words) Assignment

Protecting National Infrastructure

The paper 'Protecting National Infrastructure' presents the book by Amoroso who talks about cyber attacks and the manner in which the national infrastructure can be protected.... The article provides information on how through international cooperation there have been efforts to foster the establishment of the national and international watch and warning networks in order to detect and prevent cyber attacks as they emerge.... The article by the national Institute of Standards and Technology (2014), provides a framework for enhancing critical infrastructure cybersecurity....
1 Pages (250 words) Literature review

Critical Infrastructure: American Subway

The paper “Critical infrastructure: American Subway” evaluates one of America's key transportation infrastructure that has a significant impact on the economy.... Critical infrastructure: American SubwayThe subway is one of Americas key transportation infrastructure that has a significant impact on the economy.... national Research Council (U.... national Cooperative Highway Research Program....
2 Pages (500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us