Verified Document

Critical Infrastructures And Cybersecurity Chapter

Cyber Terrorism Cybersecurity has emerged as one of the important components of modern security initiatives because of rapid advancements of technology and the Internet. Ensuring cybersecurity has become important because of the vulnerabilities of critical infrastructures to cyber attacks in the aftermath of the 9/11 terror attacks. As part of efforts to enhance cybersecurity, federal and state governments in the United States have enacted laws that define the role of various stakeholders in protecting the nation's critical infrastructures. These laws govern the responsibilities of companies and organizations in protecting themselves and customers. In addition, these regulations have some costs associated with them given that enhancing cybersecurity is a relatively complex process.

Organizations' Role in Protecting Themselves and Customers

As cyber attacks continue to increase in the recent past, the federal government has enacted laws and policies to govern the role of organizations in protecting themselves and customers. Based on the executive order signed by President Obama in 2015, organizations need to establish cybersecurity infrastructures that prevent unauthorized acquisition or access to electronic data that comprises personal information (Heilbrun & Brown, 2011). Secondly, organizations are required to inform those affected by any data breach and the Federal Trade Commission within...

If the data breach affects at least 5,000 individuals, organizations are required to notify the major credit reporting bodies. The executive order expanded the powers and authority of the Federal Trade Commission to penalize organizations or businesses for any failure to respond to theft and/or unauthorized access of personal information in a responsible and timely manner. Therefore, the role of organizations in protecting themselves and customers based on U.S. laws on cybersecurity involves preventing unauthorized access and notify relevant stakeholders of any data breaches.
Companies' Responsibilities

Companies and businesses also play a crucial role in enhancing cybersecurity given that they have joined national initiatives towards improving transaction security (Aspen Publishers, 2015). One of the responsibilities of companies is to adopt more secure payment technologies, which act as indicators to customers that their protection of their electronic personal information is treated seriously. In this regard, companies are required to undertake appropriate measures to secure their own systems and provide more secure options to the customers. Secondly, companies are faced with the need to enhance information sharing in order to improve response to incidents of data breaches and fraud. Third, companies should engage in strategic partnerships and alliances through…

Sources used in this document:
References

Aspen Publishers. (2015, January). President Obama Signs Cybersecurity Executive Order. The Computer & Internet Lawyer, 32(1), 24. Retrieved from http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=18551_mcpls&v=2.1&id=GALE%7CA394183506&it=r&asid=5cc81d8f040ed73e605ae170f9d004c1

Heilbrun, M.R. & Brown, I. (2011, December). Cybersecurity Policy and Legislation in the 112th Congress. Intellectual Property & Technology Law Journal, 23(12), 24. Retrieved from http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=18551_mcpls&v=2.1&id=GALE%7CA273587143&it=r&asid=ceebf07425038136e6c561f5eaf0f61d

Schwalb, M. (2006). Exploit Derivatives & National Security. Yale Journal of Law & Technology, 9, 162. Retrieved from http://go.galegroup.com/ps/i.do?p=AONE&sw=w&u=18551_mcpls&v=2.1&id=GALE%7CA182035194&it=r&asid=bdba2800f5f791182662e8f9083e0333
Cite this Document:
Copy Bibliography Citation

Related Documents

What is Critical Infrastructure
Words: 709 Length: 2 Document Type: Essay

Infrastructure is effectively what makes a nation run. It encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland Security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and

Public Private Partnerships and Critical Infrastructure
Words: 331 Length: 1 Document Type: Essay

Private Security and Homeland Defense Most of the critical infrastructure in the United States is regulated by the public sector, but owned by the private sector. As a result, protection of U.S. critical infrastructure is a major challenge because of complexities in both the public and private sectors. Moreover, safeguarding critical infrastructure is complicated by the sophisticated and growing assortment of cybersecurity challenges (Brooks par, 2). Given the involvement of the

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability Issues
Words: 2738 Length: 10 Document Type: Research Paper

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

Electronic Medical Records and Cybersecurity
Words: 2015 Length: 7 Document Type: Essay

Essay Outline I.  Introduction a.  Briefly introduce the importance of electronic medical records (EMRs) and the growing concern of cybersecurity within this context. II.  The Evolution of Electronic Medical Records a.  Discuss the transition from paper records to digital records, highlighting milestones in EMR adoption. b.  Mention the benefits of EMRs to healthcare efficiency and patient care. III.  Cybersecurity Challenges in EMRs  a.  Identify key cybersecurity threats to EMRs (e.g., data breaches, ransomware, phishing). b.  Discuss the implications

Cyber Security for Intelligence Organizations
Words: 3111 Length: 10 Document Type: Research Paper

The Integration of Threat Intelligence and Incident ResponseTable of ContentsAbstract 1Introduction 1The Issue of Threat Intelligence and Incident Response 2How the Tool Works 3How the Organization Can Use It 3Review of the Tool 4Relevance to Threat Modeling and Intelligence Organizations 4Core Concepts 5Conclusion 6References 6AbstractThreat intelligence is an important component of any security program as it can help organizations prevent future attacks. Incident response processes need to be in place

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now