Monday, June 17, 2019
Securing Critical Infrastructures and Cyber Systems Assignment
Securing Critical Infrastructures and Cyber Systems - Assignment Examplerrespondence to securing our cyberspace will eventually affect how safe and secure we are as a country and the benefits our country will reap from this digital era.Infrastructure control systems face risks because of system vulnerabilities, cyber threats and grave probable effect of attacks as displayed by account incidents. Cyber threats can be targeted or untargeted, intentional or not and come from numerous places. Control systems are nowadays more vulnerable to cyber-attacks because of numerous reasons, enumerate the increased connectivity of systems through the internet. From evidences of past control attacks, it is clear that effect on critical infrastructure is vast. In 2003 for instance, a computer virus shut tidy sum the train signaling system all through the East Coast. In 2006, a foreign hacker planted malicious software that had the ability of poignant a water treatment plants operations.Infrastru cture owners face organizational and technical challenges to securing control systems. Technical challenges include restricted processing abilities, public figure constraints and real-time operations all of which deter the owners ability to implement information technology security processes. Organizational defies which include difficulty in coming up with convincing business case for capitalizing in security and contradictory priorities of information security personnel and engineers. Numerous private heavens acts much(prenominal) as standard setting associations and trade associations are putting up efforts to aid in securing control systems. The efforts put forth by the private sector entities include, providing guidance to members, developing standards and hosting workshops on security of control systems. For instance, the electricity industry recently advanced standards for the cyber security of their control systems and a trade association (gas) is in the process of develop ing guidance to members to use encryption as a security measure to protect control
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.