Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Cybersecurity and the Critical Infrastructure, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
As the world continues to experience fast expansion in internet access and technological advancement, the problem of cybersecurity has emerged as a concerned for not only individuals and corporations but also governments. As such, stakeholder are expected garner their efforts towards addressing the menace in the best way possible. The United States has taken key steps to mitigate the problem among them the U.S. Department of Homeland Security’s blueprint for a secure cyber future and the executive order from the White House on the need to improve the critical infrastructure cybersecurity (U.S. Department of Homeland Security, 2011). Although such efforts may not provide absolute solutions to the problem of cybersecurity, they have established a clear roadmap that would improve protection of privacy, safeguard critical information infrastructure and minimize risks associated with cyber insecurity.
It would be impractical to assume that the DHS Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise address all the cybersecurity challenges related to the protecting the CI/KR because of the dynamic nature of the cybersecurity threat. As experts develop proactive strategies to address the problem, cyber criminals are spending sleepless nights to counter such strategies and as such, the problem of cybersecurity cannot be addressed by the sole blueprint but rather through increased surveillance to counter evolving threats (U.S. Department of Homeland Security, 2011). However, the document presents important steps such as training and education of people, risk management, investment in preparedness and resilience that would enable the government and related agencies minimize cyber threats significantly. The greatest achievement of this document is the guarantee for resources investment from the government and other agencies in the fight against the menace. Realization of the Blueprint’s goals would play a critical role in minimizing the problem of cybersecurity but would not provide absolute immunity to the problem or 100 percent secure cyber space.
Other documents (strategies, studies, plans, etc.) that address CI/KR cybersecurity include the National Infrastructure Protection Plan (NIPP), PSRC, Safeguarding and Securing Cyberspace by DHS and the DHS Strategy to Secure Control Systems among other reports published by related agencies (U.S. Department of Homeland Security, 2008).
The DHS Blueprint document incorporates adequate encouragement or enforcement provisions to make it effective including inclusion of the need for every person to play and instrumental role in the war against cyber insecurity. The Blueprint provides clear goals and benefits likely to be drawn from its implementation. Such goals provide stakeholders with the urge to effectively implement the blueprint to realize its full benefits (PSCR, 2012). Other motivational factors for its implementation include the direct involvement of government agencies and allocation of resources to deal with the cyber insecurity menace.
The Blueprint captures the critical concept of interdependence in the critical infrastructure such as failure in one domain of the linked up networks would have immediate impact on the operations, mission, and capability of other. It appreciates the need to put into consideration such cases in the event of preventing cyber insecurity.
The executive order “Improving Critical Infrastructure Cybersecurity” In deed meets the most of the concerns about cybersecurity and the need for direct involvement of all stakeholders in addressing the problem (The White House, 2013). The executive order takes cognizant of the fact that cyber insecurity will eventually affect everyone and as unavoidable threat that needs to be tamed or mitigated.
In conclusion, the various document on cybersecurity have provided a rich analysis of the problem initiated by the advancements in technology as well as recommendations on strategies that can help control the problem.
References
U.S. Department of Homeland Security. (2011) Blueprint for a Secure Cyber Future, The Cybersecurity Strategy for the Homeland Security Enterprise. Retrieved from http://www.dhs.gov/xlibrary/assets/nppd/blueprint-for-a-secure-cyber-future.pdf
The White House. (2013) Executive Order — Improving Critical Infrastructure Cybersecurity Retrieved from http://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity
U.S. Department of Homeland Security. (2008). A guide to critical infrastructure and key resources protection at the State, regional, local, tribal, and territorial. Retrieved from http://www.dhs.gov/xlibrary/assets/nipp_srtltt_guide.pdf
PSCR. (2012). Safeguarding and securing cyberspace. Retrieved from http://www.dhs.gov/sites/default/files/publications/Policy-PSO/pso-safeguarding-and-securing-cyberspace.pdf
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee