Critical Infrastructure Security and Policy - Essay Example

Comments (1) Cite this document
[Critical Infrastructure Security and Policy] [Instructor] [Class] Introduction USA being the most powerful state is obliged to look over on the chaos and destruction occurring around the world. In the preservation of peace in place of war or conflict, the USA has been paying a big price for this involvement in other countries…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Critical Infrastructure Security and Policy
Read TextPreview

Extract of sample "Critical Infrastructure Security and Policy"

Download file to see previous pages It certainly has grabbed the USA government attentions onto it and made them obliged to take some instantly grave actions in order to prevent the impact of resulting turmoil. CFR's latest Preventive Priorities Survey (PPS) lists insecurity in Pakistan and Saudi Arabia, an Iranian nuclear disaster, and an amplification of the European sovereign debt crisis among the most important international unforeseen event relative to U.S. national interests that has ultimately shaped as a frightening threat to the USA. Let us examine carefully all the threats that have been experienced by the USA and see the reason behind every threat (Chertoff, 2009). The outburst of Cyber Attacks Countries that attack the United States China Russia There are two countries in particular that have recently advanced their cyber attacks on the United States because of their new revival into the global economy, China and Russia. The United States had publicly accused both China and Russia of recent attacks that the United States had experienced. This recent attack from China exposed that China was aiming 48 different defense corporations from the United States, United Kingdom, and Bangladesh (Kim, 2011). This has been an enduring theme from China, who is trying to achieve information and blueprints from countries that have better more advanced technology than they do themselves. While Russia doesn’t attack the United States as repeatedly as China does, simply because Russia doesn’t have the hackers available to attack a defense shield as the United States has, they are getting an abundance of practice on the former countries part of the Soviet Union (energy. Gov, 2012). Along with different countries that use cyber attacks to target the United States there are also terror groups that are starting to use cyber attacks and also other groups seeking to chop into government systems to gather information. It is predictable that with the physical defense of countries growing especially the United States, that terrorists which rely on cyber terror attacks on the United States rather than physical attacks because it is now much convenient and effective to shake the United States dominance via cyber attacks. Threats to control systems can come from various resources, including antagonistic governments, terrorist groups, annoyed employees, and malicious burglars. To guard against these threats, it is essential to construct a secure cyber-barrier around the Industrial Control System (ICS). Now the USA digital infrastructure is vulnerable. Yet the Department of Defense can’t do everything on its own. Corporations that don’t shield themselves are putting both their bottom lines and national security at threat. Yes, cyber security standards are an imperfect response to a weird and dangerous new kingdom of conflict. At the moment, though, they’re the only thing eminence between us and the abyss (Johsen, 2011). Al Qaeda threatens to USA The fact that a catastrophic attack against America equivalent to 9/11 has not occurred over the past 11 years should not recommend that a future one is not being designed. In summer 2006, al Qaeda-linked functioning in London schemed to explode liquid explosives on board 10 transatlantic airliners flying from the UK to America and Canada. In September 2009, Najibullah Zazi and his acquaintances were detained for plotting to carry out a suicide ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Critical Infrastructure Security and Policy Essay”, n.d.)
Retrieved from
(Critical Infrastructure Security and Policy Essay)
“Critical Infrastructure Security and Policy Essay”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
elna14 added comment 2 days ago
Student rated this paper as
At first, I thought 9 of pages is too much for such a subject. But now I see it could not be done better. As the author starts you see the depth of the topic. I’ve read all at once. Terrific text

CHECK THESE SAMPLES OF Critical Infrastructure Security and Policy

Homeland Security and Critical Infrastructure Protection

...the background of the US homeland security issues and the authors have taken a broader view of some of the challenges of mitigating the security risks and attaining emergency preparedness. In this regard, the book is significantly important in enhancing the awareness of the students in areas such as integrating strategies and policies to mitigate the current security threats to critical infrastructures. In my opinion, the book is one of the few texts books on homeland security which offers a comprehensive thematic coverage of the current threats of terrorist attacks as part of as part of the US security...
5 Pages(1250 words)Book Report/Review

Critical Infrastructure Identification

...? Critical Infrastructure Identification According to Moteff and a Parfomak (2004) the meaning of critical infrastructure in the public policy context has evolved overtime and is still open to debate. In the 1980’s it was primarily defined in relation to public works but this definition was reconsidered and now reflects the increasing importance of homeland security. The American Heritage Dictionary (qtd. in Moteff and Parfomak 2004) defines infrastructure as: The basic facilities, services, and installations that are required for the community and society to function. These include transportation, communication systems; water and power lines as well as public institutions which includes schools, post offices and prisons... ...
6 Pages(1500 words)Research Paper

IT infrastructure security

...PENETRATION TEST: REPORT Penetration testing is termed as the authorized and proactive attempt to evaluate IT infrastructure security by safely making attempts to exploit the possible system vulnerabilities, including service application flaws, OS, risky end-user behavior and even configurations. This kind of assessment is also useful in verifying the capacity of defensive mechanisms implemented and checking end-users’s compliance to security policies. The penetration test are basically performed using automated or manual technologies to compromise systems, endpoints, network devices, web applications and other potential exposure points( Brook and Hall 2007). After successfully exploiting vulnerabilities on a particular system... the...
10 Pages(2000 words)Term Paper

Infrastructure and Security

...?Infrastructure and security Number Introduction The paper describes the network design and the security requirements for Hi-Tech Data Collection Corporation. Hi-Tech Data Collection Corporation is a medium size business organization that has the potential of expanding from floor to three floors in the extremely near future. The network system that will meet the company’s requirement should adhere to the EISA standards. To ensure that the standards are met, I will follow the system design and implementation process. The process entails network planning, design, implementation, testing and documentation, and security. The proposed network should make the company’s...
6 Pages(1500 words)Assignment

Infrastructure and Security

...? Infrastructure and Security Infrastructure and Security A network infrastructure is an organization and configuration of interlinked computer systems, of a corporation, connected through various pieces of communication architecture. Network security, on the other hand, involves protecting the laid computer infrastructure from unauthorized access, continuity of services by assets, and continuity and integrity of operations. Therefore, network infrastructure laid out in an organization, works hand in hand with network security and cannot do with either of them being present (Stilwell et...
4 Pages(1000 words)Essay

Critical Infrastructure Protection

...? Critical Infrastructure Protection Examine the Department of Homeland Security a. Mission-The broad mission of the Department of Homeland Security emphasizes on creating watchfulness on the perspective of safety associated with America’s Critical Infrastructure and Key Resources (CIKR) and also for ensuring proper business operations for the government and the private sector in a routine and day to day manner (GAO, 2011; Homeland Security, 2009). b. Operations-The operational process of Department of Homeland Security includes integration, leadership and coordination of the broad efforts pertaining to...
3 Pages(750 words)Essay

Critical Infrastructure Protection

...? Critical Infrastructure Protection al Affiliation Critical Infrastructure Protection Mission of the Department of Homeland Security Security has become a major concern in the United States in recent years more than ever. This follows the 9/11 terrorist attacks on the World Trade center. The incident left many Americans dead, and property worth billions of dollars destroyed. IBP USA (2003) reported that the incident did expose the United State’s vulnerability to terrorist attacks from both within and outside its borders. Reflecting on what happened on that fateful day; one is left wondering how it happened and where the...
3 Pages(750 words)Assignment

Network security infrastructure

...NETWORK SECURITY INFRASTRUCTURE By: Network Security Infrastructure Recently, theuse of the Internet has continued to grow exponentially. Individual, business, and government applications have multiplied on the internet. This development has an immediate benefit to the users. However, these internet-based services and applications sometimes pose security threats to the internet users. Information is a delicate asset that must be properly protected. Without proper network security measures, many individual, government agencies and business enterprises risk losing their data. Network security is basically a process by whbyich digital data assets are protected. On the other hand, Internet Security Infrastructure is the arrangement... traffic,...
2 Pages(500 words)Essay

Privately Owned Critical Infrastructure ensure that the gases do not leak out even in the event of natural disasters such as earthquakes. It is important to note that most natural disasters or terrorist attacks on critical infrastructure pose a challenge, as they require a response to the event with a high possibility that different hazardous substances have been released into the environment. As much as all the releases require separate attention, the personnel face a task in handling the consequences of the event. As such, the private sector has a role to play in the establishment of emergency plans that put into consideration the characteristics of the natural disasters or terrorist events (Busch & Givens, 2012). The private sectors...
7 Pages(1750 words)Assignment

Critical Infrastructure: American Subway

...Critical Infrastructure: American Subway The subway is one of Americas key transportation infrastructure that has a significant impact on the economy. The subway provides cheap and reliable transport to American citizens. It provides transport to people living away from the city with regular and fast transport in and out of the city. The main aim of a terrorism threat is to instill fear into the people. Any terror threat on the subway would affect the economy directly through reduction of productivity. A threat on the subway may be in the form of explosive devises placed on the rails or the trains. This would cause a fatal accident for the passengers and the people adjacent the train at the time of the explosion. The attack... on the...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Critical Infrastructure Security and Policy for FREE!

Contact Us