Critical Infrastructure Protection Using Computers in Modern Society Essay

Total Length: 693 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Critical Infrastructure Protection

Nowadays, computers have become very ubiquitous in the American society. Computers and related technologies are used at every level of government in the United States. Computer technologies are also used by all sorts of professionals, and private citizens to access information, store information, communicate, and/ or transform acquired information. Right now, there are also computer-dependent technologies that are used to monitor and control, critical transportation systems, water treatment and distribution systems, power grids, gas distribution systems, and oil transport systems. Moreover, virtually all aircrafts are guided by GPS (Global Positioning System), and other computer-linked/ related systems. From the above-made statements, it is clear that there is a need for coordinated security systems to protect critical computer systems that are keeping the world moving. This means there is a strong need for cooperation among stakeholders for the successful protection of critical infrastructure.

According to the Department of Justice, any unpermitted intrusion into a critical national security system by an individual or a group of individuals is a crime (Sharp, 1998). It is the responsibility of all levels of governments in the United States to prevent unauthorized intrusion into critical systems. Critical infrastructure security is therefore the responsibility of all stakeholders.

Stuck Writing Your "Critical Infrastructure Protection Using Computers in Modern Society" Essay?

There are quite a number of prevention initiatives that have been used over the years to protect critical infrastructure. The initiatives are aimed at ensuring that relevant agencies, local and state governments, and private actors share critical information and cooperate effectively. There are three main principles that guide the prevention initiatives in the United States. They are:

(1) Engaged Partnerships: The prevention of attacks on critical infrastructure is a shared responsibility among all levels of government, security agencies, private agencies, private citizens, and global partners. Every stakeholder has to play an important role in building prevention capacity, developing prevention plans, and in preparing adequately for possible attacks on important infrastructure.

(2) Scalability, Adaptability, and Flexibility: Core prevention capabilities should be scalable, adaptable, and flexible enough to address emerging terrorist threats. This is important for the prevention capabilities to continue being relevant as threats continue evolving.

(3) Readiness to Act: This is perhaps the most important principle. Identified threats ought to be immediately neutralized in an organized and pre-planned manner by all partners involved in terrorism prevention (Homeland Security, 2016).

The evolving nature of physical and cyber threats in the US have blurred….....

Show More ⇣

     Open the full completed essay and source list


     Order a one-of-a-kind custom essay on this topic


Auerswald, P., Branscomb, L. M., La Porte, T. M., & Erwann, M-K. (2005). The challenge of protecting critical infrastructure. Retrieved from

Harrell, B. (2017). The private sector is the key to success for the department of homeland security. Retrieved from

Homeland Security. (2016). National prevention framework. Retrieved from

Sharp, W. G. (1998). Critical infrastructure protection: A new era of national security. International & National Security Law Practice Group Newsletter, 2(2). Retrieved from

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Critical Infrastructure Protection Using Computers In Modern Society" (2018, September 28) Retrieved October 19, 2020, from

Latest MLA Format (8th edition)

Copy Reference
"Critical Infrastructure Protection Using Computers In Modern Society" 28 September 2018. Web.19 October. 2020. <>

Latest Chicago Format (16th edition)

Copy Reference
"Critical Infrastructure Protection Using Computers In Modern Society", 28 September 2018, Accessed.19 October. 2020,