Verified Document

Critical Infrastructure Protection Using Computers In Modern Society Essay

Related Topics:

Critical Infrastructure Protection Nowadays, computers have become very ubiquitous in the American society. Computers and related technologies are used at every level of government in the United States. Computer technologies are also used by all sorts of professionals, and private citizens to access information, store information, communicate, and/ or transform acquired information. Right now, there are also computer-dependent technologies that are used to monitor and control, critical transportation systems, water treatment and distribution systems, power grids, gas distribution systems, and oil transport systems. Moreover, virtually all aircrafts are guided by GPS (Global Positioning System), and other computer-linked/ related systems. From the above-made statements, it is clear that there is a need for coordinated security systems to protect critical computer systems that are keeping the world moving. This means there is a strong need for cooperation among stakeholders for the successful protection of critical infrastructure.

According to the Department of Justice, any unpermitted intrusion into a critical national security system by an individual or a group of individuals is a crime (Sharp, 1998). It is the responsibility of all levels of governments in the United States to prevent unauthorized intrusion into critical systems. Critical infrastructure security is therefore the responsibility of all stakeholders. There...

The initiatives are aimed at ensuring that relevant agencies, local and state governments, and private actors share critical information and cooperate effectively. There are three main principles that guide the prevention initiatives in the United States. They are:
(1) Engaged Partnerships: The prevention of attacks on critical infrastructure is a shared responsibility among all levels of government, security agencies, private agencies, private citizens, and global partners. Every stakeholder has to play an important role in building prevention capacity, developing prevention plans, and in preparing adequately for possible attacks on important infrastructure.

(2) Scalability, Adaptability, and Flexibility: Core prevention capabilities should be scalable, adaptable, and flexible enough to address emerging terrorist threats. This is important for the prevention capabilities to continue being relevant as threats continue evolving.

(3) Readiness to Act: This is perhaps the most important principle. Identified threats ought to be immediately neutralized in an organized and pre-planned manner by all partners involved in terrorism prevention (Homeland Security, 2016).

The evolving nature of physical and cyber threats in the US have blurred the boundaries between public and private…

Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Network Security Issues Computer
Words: 1894 Length: 6 Document Type: Research Paper

In some instances, policies implemented mainly as cost-effective shortcuts to network system security have cost otherwise good employees their jobs for violations of excessively restrictive network use policies. In the realm of the home computer user, it is possible to buy many new redundant or unnecessary security programs and features. Generally, appropriate network security should not interfere noticeably with either personal home computer use or computer system use in

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Use of Content Filters on Internet in High School
Words: 14424 Length: 42 Document Type: Term Paper

Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's

The Phenomenon of Decreased Usage of Nuclear Energy
Words: 29097 Length: 7 Document Type: Essay

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 A qualitative content analysis will be conducted to explore the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. Qualitative analysis involves obtained

Qualitative Content Analysis of the Use of Nuclear Power
Words: 27894 Length: 3 Document Type: Essay

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 This research proposal explores the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. First, nuclear energy is declining in its share of

The Phenomenon of Decreased Usage of Nuclear Energy
Words: 27163 Length: 30 Document Type: Essay

Decreased Usage of Nuclear Energy: A Qualitative Content Analysis A Dissertation Presented using the Qualitative Content-Analysis Komi Emmanuel Fiagbe Gbedegan Christina Anastasia PH-D, Chair [Committee Name], [Degree], Committee Member [Committee Name], [Degree], Committee Member Date Approved Komi Emmanuel Fiagbe Gbedegan, 2016 This research proposal explores the phenomenon of decreased usage of nuclear energy at a time when global climate change indicates the need for increased usage of nuclear energy. First, nuclear energy is declining in its share of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now