Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
A huge threat in the form of cyber-instigated conflict exists for both the United States and the rest of the globe. Concerns about the vast capability of cyberterrorism and how inadequately their governments are prepared have increased among nations ever since the Stuxnet software was used to overcome the Iranian nuclear installations (Security Week, 2015). According to Weiss, the rate at which criminal hackers adopt more complex techniques to access vital systems is alarming because present law enforcement is unable to keep up with the bad actors completely. Weiss asserts that the most disturbing aspect of the situation is that the most dangerous of attacks are stealthy till the moment they wreak havoc. He posits that the United States faces the threat of cyber-attack mainly due to the fact that most of the nation’s economic processes are automated. The clockwork nature of the economic and technological systems makes it easier for persons with the right resources to find a weakness (Security Week, 2015). Critical infrastructures under the greatest threat include power grids, aircraft guiding systems, military equipment, major factories, and pipelines. According to the speaker, the greatest impediment to avoidance of these types of attacks is the lack of the right forensic tools to trace to root of these obscure computers and hackers. He additionally claims that about 750 of these attacks have already happened without the knowledge of the public and asserts that the public should be wary since attacks of massive proportions could be catastrophic to critical infrastructures that support systems such as healthcare and military.
The mandate of Homeland security’s NIPP is to protect infrastructure critical to the country’s most important systems. The plan has a strategy that aims to protect the infrastructure from cyber-attacks such as the Stuxnet attack on Iran. The strategy aims at collaboration of the government agencies with major infrastructure owners in a bid to share information and develop approaches that can enhance the nation’s cyber security (DHS, 2013). The strategy is based on a directive from the president regarding the strengthening of cyber security. In the directive, the issue of information sharing in terms of volume and timeliness among stakeholders in the community of critical infrastructure was stressed. The issued directive also sought the creation of a defense approach that was independent of technology so as to separate the increasing threat of overriding critical systems from a computer (Singer, 2012). Moreover, the proposed cyber security strategy afforded civil rights to the people in terms of allowing network privacy to the public (US Strategic Command, 2017). The complex nature of the environment of America’s critical infrastructure is also cited to be helpful in securing the critical systems. This is in the form of monitoring the network bridges that interconnect several infrastructures so as to detect foul play in its advent.
Moreover, aims to follow seven tenets in its bid to protect theses infrastructure. The first tenet is the management of risk through implementation of effective firewalls and other systems to detect and inhibit intrusion from hackers (IT-ISAC). The second tenet is the increment in understanding of the interconnections and dependencies of all critical system so as to strengthen weak links (DHS, 2013). The third tenet is free, effective and timely sharing of quality information among stakeholders in the community of critical infrastructure. The fourth tenet is the provision of unique outlooks and perspectives so as to brainstorm on how best to implement cyber security measures. The fifth tenet of the component seeks to increase collaboration between players in different regions within the country. The sixth tenet is the involvement of the international community since threats from outside the country are also feasible due to the distal capability of technology. The last tenet is the consideration of security during the design of critical infrastructure assets so as to create a national tamper-proof framework.
There are organizations specific to the cyber security program in collaboration with NIPP. The National Cyber Security and Communications Integration Center (NCCIC) is an organization within Homeland security whose main mandate is to provide a framework for information sharing with regard to cyber security. Agencies specific to the center include:
This organization plans and coordinates the synchronization of information sharing and analyses among cyber security stakeholders.
This organization focuses on the identification of threats to the country’s network (DHS, 2017).
This organization focuses on the identification of threats to the country’s critical systems.
This organization coordinates the restoration and protection of the country’s telecommunication systems.
In addition to sector specific agencies, the government has also accorded several federal agencies with cyber security obligations. These agencies include:
This agency has been granted the lead role of investigating cyber-attacks in the country.
This agency runs a computer forensics institute that equips law enforcement agencies with cyber security knowledge.
This organization enforces cyber security with reference to financial crimes.
DHS. (2013). National Infrastructure Protection Plan . Retrieved July 03, 2017, from https://www.dhs.gov/national-infrastructure-protection-plan
DHS. (2017). Capabilities guide: The National Cybersecurity and Communications Integration Center (NCCIC). Retrieved July 03, 2017, from https://www.dhs.gov/national-cybersecurity-and-communications-integration-center
DHS. (2017). Computer Emergency Readiness Team, US-CERT. Retrieved July 03, 2017, from https://www.us-cert.gov/
IT-ISAC. (n.d.). The Information Technology - Information Sharing and Analysis Center. Retrieved July 03, 2017, from http://www.it-isac.org/
Security Week. (2015, October 16). Cyber war threat: The chilling reality of threats facing America’s critical infrastructure . Retrieved July 03, 2017, from Security Week: http://www.securityweek.com/cyberwar-threat-chilling-reality-threats-facing-americas-critical-infrastructure-video
Singer, P. (2012). The cyber terror bogeyman. Retrieved July 03, 2017, from Brookings Institute: http://www.brookings.edu/research/articles/2012/11/cyber-terror-singer
US Strategic Command. (2017). US Strategic Command. Retrieved July 03, 2017, from https://www.stratcom.mil/factsheets/2/Cyber_Command/
Hire one of our experts to create a completely original paper even in 3 hours!