StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Securing Critical Infrastructure and Cyber Systems - Essay Example

Cite this document
Summary
In the paper “Securing Critical Infrastructure and Cyber-Systems” the author discusses an increase in the integration of ICT (Information and communications technology) into the everyday activities of governments, families, consumers, and industries together with a corresponding growth in cyberspace…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Securing Critical Infrastructure and Cyber Systems
Read Text Preview

Extract of sample "Securing Critical Infrastructure and Cyber Systems"

Infrastructure control systems face risks because of system vulnerabilities, cyber threats, and grave probable effects of attacks as displayed by reported incidents. Cyber threats can be targeted or untargeted, intentional or not, and come from numerous places. Control systems are nowadays more vulnerable to cyber-attacks because of numerous reasons, counting the increased connectivity of systems through the internet. From the evidence of past control attacks, it is clear that the effect on critical infrastructure is vast.

In 2003 for instance, a computer virus shut down the train signaling system all through the East Coast. In 2006, a foreign hacker planted malicious software that had the ability to affect a water treatment plant’s operations. Infrastructure owners face organizational and technical challenges to securing control systems. Technical challenges include restricted processing abilities, design constraints, and real-time operations all of which deter the owner’s ability to implement information technology security processes.

Organizational defies which include difficulty in coming up with a convincing business case for capitalizing in security and contradictory priorities of information security personnel and engineers. Numerous private sector acts such as standard-setting associations and trade associations are putting up efforts to aid in securing control systems. The efforts put forth by the private sector entities include providing guidance to members, developing standards, and hosting workshops on the security of control systems.

For instance, the electricity industry recently advanced standards for the cybersecurity of their control systems, and a trade association (gas) is in the process of developing guidance to members to use encryption as a security measure to protect control systems.Two areas of precise concern include protecting the country’s critical infrastructure (roughly 70-90% of which are privately owned) against cyber threats, together with addressing potential weaknesses in the universal nature of the ICT source chain.

Both policymakers and the ICT industry share the collective objective of addressing these worries. Concerning critical infrastructure, the existing voluntary public-private partnership exemplary has offered private-sector proprietors and operatives with the flexibility they require to address bouts as they occur – principally as cyber-attacks have amplified in both sophistication and volume.Important investments in security from operatives and ICT dealers, strong network organization, application of best practices and procedures, and intentional coordination are all vital constituents of the current ecology that has threatened critical infrastructure from substantial attacks.

These mechanisms should continue to offer the basis for critical infrastructure policy moving forward.Government agencies have also had numerous initiatives that are underway to aid in the security of infrastructure control systems. Despite all these efforts, more still remains to be done to manage these efforts and also to address specific deficits. In recent years, federal agencies; the departments of energy, Homeland security, and the (FERC) Federal Energy Regulation Commission have started efforts to advance the control systems’ security of the critical infrastructure.

However, there is still no common strategy to coordinate the numerous activities across government agencies and the private sector. Additionally, DHS lacks procedures required to address exact weaknesses in information sharing on control systems' weaknesses. Until private and public sector security exertions are synchronized by an all-encompassing plan and specific information sharing deficits are addressed, there is an upsurge risk that numerous organizations will conduct duplicative work and miss chances to achieve their critical missions.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Securing Critical Infrastructure and Cyber Systems Essay, n.d.)
Securing Critical Infrastructure and Cyber Systems Essay. https://studentshare.org/information-technology/1696195-securing-critical-infrastructures-and-cyber-systems
(Securing Critical Infrastructure and Cyber Systems Essay)
Securing Critical Infrastructure and Cyber Systems Essay. https://studentshare.org/information-technology/1696195-securing-critical-infrastructures-and-cyber-systems.
“Securing Critical Infrastructure and Cyber Systems Essay”. https://studentshare.org/information-technology/1696195-securing-critical-infrastructures-and-cyber-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Securing Critical Infrastructure and Cyber Systems

An Innovative Model for the National Level Security Team

uestion oneThe National Academy of Sciences study of emergency management concluded that efficient emergency managers need critical future skills such as grasp of the public administration and budgeting skills.... The paper gives detailed information about the requirements for emergency managers, the main features which an effective manager should have....
5 Pages (1250 words) Essay

Sectors Targeted by Cyber Terrorism

The transport sector and the critical infrastructure of the country are also top targets of cyber terrorists.... In the United… Cyber terrorists have unlawfully invaded financial institution systems and caused losses to them. The security sector and the financial institutions The manufacturing sector has also been heavily targeted and attacked by cyber terrorists and criminals.... Cyber terrorist may attack manufacturing industries systems so as to get access to the data concerning the processes and procedures used in that industry....
4 Pages (1000 words) Research Paper

Most important system of critical national infrastructure

Furthermore, security also stands out as the most important critical infrastructure because it encompasses many other aspects that are central to the daily activities such as food.... This is the main reason why the most developed countries have the most advanced security systems.... The most developed countries have been targeted through computer attacks where fraud committed through these systems has increased in the modern world.... The computer systems may be secured through establishment of systems that have real time detection and reporting of any intrusion activities....
2 Pages (500 words) Essay

Evidence-Based Techniques for Evaluating Cyber Protection Systems for Critical Infrastructures

This research concludes that the evidence-based model adequately sheds light on the ambiguity or insecurity in the user feedback to the CPS evaluation, and thus in the provisional risk assessments for the whole physical and cyber protection scheme.... hellip; This, alongside the growing reliance of societies on critical infrastructure systems that guarantee the delivery of essential, basic services, obliges every state and organization to prioritize the protection of these systems....
1 Pages (250 words) Essay

Proposing a Solution

It incorporates all intentional attacks targeted at… For instance, the cyber attacks directed at the credit transaction service would see the data transactions of the e-commerce system altered into the vast banking systems.... Therefore, it is essential to establish workable approaches to maintaining the security of the communication and technological systems.... The cost to the nation is the absence of coordinated systems, which can bring the entire internet system of the nation down....
6 Pages (1500 words) Essay

Types and Categories of Threats to IT Systems

The paper "Types and Categories of Threats to IT systems" states that CISM is an internationally recognized certification.... The systems may be at risk from individuals, militia groups and terrorists who are out to cause mayhem.... This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system....
7 Pages (1750 words) Essay

Impact of Legislation on Internal Revenue Service

However, this can only be achieved if there is a mutual deal of cooperation between the operators of critical infrastructure and its owners.... The paper aims to analyze and review the IRS's information security program and its program evaluation programs in accordance with Cyber Security Legislative Proposal of 2012, the Presidential Policy Directive pertaining to critical infrastructure resilience and security and… In addition, points of analysis have been chosen from the three sources to better inform the way forward for cyber security enforcement in not only government agencies but also private The paper "Impact of Legislation on Internal Revenue Service" is a perfect example of an essay on law....
4 Pages (1000 words) Essay

Significance of Critical Infrastructure

nbsp; Moreover, government institutions should take raising awareness seriously because knowledge is the key in the area of securing critical infrastructure.... securing critical infrastructure is no longer a choice but a must for a country to thrive.... The paper "Significance of critical infrastructure" discusses that the main factor that can help in the deterrence of cyber intrusions is education.... Cyber threats to critical infrastructure continue to increase prompting governments to develop policies that would enhance security....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us