Cyber Security Case Study

1438 Words3 Pages

CRITICAL INFRASTRUCTURE - INFORMATION TECHNOLOGY
Executive Summary: The Information Technology Sector in the United States is an extremely complex environment supporting and interdependent between all 16 sectors. According to the department of Homeland Security, “These virtual and distributed functions produce and provide hardware, software, IT systems and services, and in collaboration with the Communications Sector the Internet” (DHS, 2014).
Problem Statement: In the United States, the Information Technology Sector has showed increased reliance on computer systems, which they have linked to almost all their vital infrastructures. Today, however, there is growing concern regarding diverse cyber security threats, which are directed towards …show more content…

For instance, when Republicans attain majority control over the U.S. as well as the Senate, they are anticipated to face a foreign policy, which has grown increasingly complex because of heavy reliance on the Internet. In the recent years, Congress has engaged in serious programs to facilitate the adoption of reform regarding cyber security without success. Based on the growing number of attacks in the U.S., America has realized that companies and consumers are highly prone to attack by ever increasing hackers (Radvanovsky & McDougall, 2013).
Goal of Briefing: The key reason for briefing is to take a position on the issue of cyber security to reveal the potential threats it can pose to Information Technology critical infrastructure in the United Sates. It aims at seeking support for ensuring that information systems are given extraordinary support and scrutiny to eliminate any loopholes that may pose threats to the stability of the country’s critical infrastructure and consequently, collapse of the …show more content…

Firstly, they should ensure that organizations comply with information technology regulations. Secondly, they should ensure that IT staff are well equipped with technical knowhow to ensure they can pinpoint any forms of threats and take appropriate actions in advance. Lastly, the government, private sector, and other stakeholders should share information concerning diverse forms of threats to facilitate in the establishment of effective measures for addressing any forms of security threats (Moore & Shenoi,

More about Cyber Security Case Study

Open Document