National Infrastructure Vulnerability Nation Infrastructure This Report Essay

Total Length: 883 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

National Infrastructure Vulnerability

Nation Infrastructure

This report covers how the United States does and should address threats to its critical national infrastructure. Vulnerability to attacks like the SCADA/Stuxnet worm will be addressed as well as mitigations as they relate to the seven domains. The assessment of levels of responsibility to protect both the public and private sectors will be covered as well as the elements of an effective IT security policy framework. No less than three scholarly resources will be used for this report, as per the parameters of the assignment.

SCADA/Stuxnet

The Stuxnet word made major shockwaves when it came to be known fully in roughly 2010. Presumed by many to be the product of cooperation with the Israeli and United States governments to attack Iran and perhaps inhibit their ability to manufacture and process nuclear devices and materials, the worm specifically attacks Siemens (SCADA) devices that relate to the data management of infrastructure devices. While this attack was clearly targeted at Iran, such a methodology and attack could certainly be turned around and used against the United States and/or other Western nations and this would obviously have horrible effects (Goodin, 2010).

Mitigations across the Seven Domains

The seven domains of IT infrastructure must be managed by the government to protect both the public and private sector. These seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, remote access domain, WAN domain and System/Application Domain.

Stuck Writing Your "National Infrastructure Vulnerability Nation Infrastructure This Report" Essay?

There are two basic elements that can be used to fight attacks from computer viruses, other malware, social engineering and computer worms like Stuxnet and other more common viruses and worms. Those two tools are user education and deployment of security solutions. Not all solutions are obvious. An established antivirus and anti-malware system across all domains is a must, of course (UMW, 2013).

However, the increase and ferocity from tactics such as social engineering, user carelessness and the like can be very problematic as well. Examples of social engineering would be criminals using social tactics and ploys to get information that they cannot or should not have. User carelessness includes losing of laptops and other important equipment, leaving workstations unsecured and so forth. Users must be educated on what to do, what not to do and users must be disciplined if they screw up. Lastly, users must be protected from themselves via tactics like laptop encryption, idle timer lockouts and so on (UMW, 2013).

Responsibility Assessment

As far as how to assess levels of responsibility to protect the public and private sector, that can also be broken into two major parts. The high-level IT personnel as well as the agency executives….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"National Infrastructure Vulnerability Nation Infrastructure This Report" (2013, May 18) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/national-infrastructure-vulnerability-nation-90538

Latest MLA Format (8th edition)

Copy Reference
"National Infrastructure Vulnerability Nation Infrastructure This Report" 18 May 2013. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/national-infrastructure-vulnerability-nation-90538>

Latest Chicago Format (16th edition)

Copy Reference
"National Infrastructure Vulnerability Nation Infrastructure This Report", 18 May 2013, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/national-infrastructure-vulnerability-nation-90538