Verified Document

National Infrastructure Vulnerability Nation Infrastructure This Report Essay

National Infrastructure Vulnerability Nation Infrastructure

This report covers how the United States does and should address threats to its critical national infrastructure. Vulnerability to attacks like the SCADA/Stuxnet worm will be addressed as well as mitigations as they relate to the seven domains. The assessment of levels of responsibility to protect both the public and private sectors will be covered as well as the elements of an effective IT security policy framework. No less than three scholarly resources will be used for this report, as per the parameters of the assignment.

SCADA/Stuxnet

The Stuxnet word made major shockwaves when it came to be known fully in roughly 2010. Presumed by many to be the product of cooperation with the Israeli and United States governments to attack Iran and perhaps inhibit their ability to manufacture and process nuclear devices and materials, the worm specifically attacks Siemens (SCADA) devices that relate to the data management of infrastructure devices. While this attack was clearly targeted at Iran, such a methodology and attack could certainly be turned around and used against the United States and/or other Western nations and this would obviously have horrible effects (Goodin, 2010).

Mitigations across the Seven Domains

The seven domains of IT infrastructure must be managed by the government to protect both the public and private sector. These seven domains...

There are two basic elements that can be used to fight attacks from computer viruses, other malware, social engineering and computer worms like Stuxnet and other more common viruses and worms. Those two tools are user education and deployment of security solutions. Not all solutions are obvious. An established antivirus and anti-malware system across all domains is a must, of course (UMW, 2013).
However, the increase and ferocity from tactics such as social engineering, user carelessness and the like can be very problematic as well. Examples of social engineering would be criminals using social tactics and ploys to get information that they cannot or should not have. User carelessness includes losing of laptops and other important equipment, leaving workstations unsecured and so forth. Users must be educated on what to do, what not to do and users must be disciplined if they screw up. Lastly, users must be protected from themselves via tactics like laptop encryption, idle timer lockouts and so on (UMW, 2013).

Responsibility Assessment

As far as how to assess levels of responsibility to protect the public and private sector, that can also be broken into two major parts. The high-level IT personnel as well as the agency executives themselves need to construct the best practices, best prevention…

Sources used in this document:
References

Goodin, D. (2010, September 22). SCADA worm a 'nation state search-and-destroy weapon'. The Register. The Register: Sci/Tech News for the World. Retrieved May 18, 2013, from http://www.theregister.co.uk/2010/09/22/stuxnet_

worm_weapon/

Taylor, L. (2001, February 16). Seven elements of highly effective security policies |

ZDNet. ZDNet | Technology News, Analysis, Comments and Product Reviews for IT Professionals. Retrieved May 18, 2013,from http://www.zdnet.com/news / seven-elements-of-highly-effective-security-policies/297286
Cite this Document:
Copy Bibliography Citation

Related Documents

National Preparedness Report
Words: 972 Length: 3 Document Type: Essay

DHS and the NPR The National Preparedness Report was structured in a strategic manner by the Department of Homeland Security (DHS). There was a great deal of scrutiny and assessment which occurred when this report was put together as much of it represented the most recent work of DHS, their theories, objectives and recent discoveries. Thus, the structure of the report was incredibly important. One aspect of the report appears to be

U.S. National Strategy What Three United States
Words: 4520 Length: 16 Document Type: Essay

U.S. National Strategy What three United States national interests do you think will be at great risk over the next five years? Describe those interests and identify which instruments of national power can be leveraged to protect or advance those national interests and how those instruments can be used. As President Obama stated in his addresses to Congress in February 2009, the most important problem that the country faced was the economy,

Globalization and National Differences in
Words: 3446 Length: 10 Document Type: Research Paper

But when the village is being rebuilt, consensus is not easy (Kurup)." This is a pointed criticism of using a U.S. model where the financial sector is doing well (the speculative economy) as opposed to the "real" economy on the street. Dr. Kurup feels that the infrastructural problems that have dogged India for years need to be solved as well so the recovery is even and across the board.

Iran Country Assessment Vulnerability Assessment
Words: 1513 Length: 4 Document Type: Research Paper

Iran Country Vulnerability Assessment Outlook Each country has extent of constraints during their development. Iran has suffered similar issues by virtue of being among the developing country. It has also been countries that require not only acquiring, but retaining its power to guard its resources. The country has also been surrounded by powerful governments of Iraq and Afghanistan which have been a threat to Iran. Iran's system of government is theocratic, meaning

UN Peacekeeping Limitations After Five
Words: 6252 Length: 20 Document Type: Thesis

Thus, "by late 1992, the catastrophic situation in Somalia had outstripped the UN's ability to quickly restore peace and stability, mainly because the UN was hamstrung by insufficient forces and UN peacekeeping principles and methods could not cope with the need to use force in such complex situations. On 3 December 1992, UN Security Council Resolution 794 authorised a coalition of UN members led by the U.S. To form

Cyber Security Vulnerabilities in Space Vehicles
Words: 4220 Length: 14 Document Type: Dissertation or Thesis complete

Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now