Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
1 page/≈275 words
Sources:
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:

Vulnerability of U.S Infrastructure to SCADA Worm (Essay Sample)

Instructions:

Vulnerability of U.S Infrastructure to SCADA Worm

source..
Content:


Cyber Security
Name
Institution
Course
Date
Vulnerability of U.S Infrastructure to SCADA Worm
A few decades ago cyber threats were thought to be minimal and could pose no danger to an entity greater than an individual’s computer and their privacy. Fast-forward to the 21st century, the threat has become so huge such that industries and nations infrastructure are on the verge of collapsing due to cyber warfare. The SCADA/ Stuxnet Worm is a good example of how complex industries and infrastructure depend on the internet (Goodin, 2010). Believed to affect industrial software systems made by Siemens, the United States depends heavily on software automated utilities ranging from electricity grids to water distribution facilities. With increased cyber attacks and shift from terrorism to such attacks, the United States stands on a verge of futile threats that could compromise its infrastructures and security. The infrastructural innovations across the U.S are based on automated softwares that aid in almost their entire functionality. This makes the country vulnerable to almost any form of cyber attacks. Once a determined hacker target’s various weak spots in a given city, it becomes overwhelming for operators to control or mitigate such attacks. SCADA/Stuxnet Worm proves that no industrial software system is unbreachable.
Mitigation Methods
To ensure catastrophic consequences don’t take place as a result of poor test projects, the government as well as involved stakeholders in the infrastructure business could employ the following mitigation methods. Since the threat to cyber warfare is global a responsible cyber engagement is needed. The United States can use its superiority and condemn the usage of internet from uncooperative nations that try to support cyber wars. Weakening these nations will eventually weaken the hackers grip on the situation. Suppressing the environment that enables such hackers to start cyber warfare is greatly needed.
Establishing a firm cyber workforce within the industry and government that can adapt and manage cyber threats can also help mitigate the issue. A Science, Technology, Engineering, and Mathematics education program to help the country adjusts its facilities to cope with threat issues regarding cyber attacks and well-equipped personnel (Bucci, Rosenzweig & Inserra, 2013). Education creates awareness and helps the workforce to learn of the trend, expectations, and experiences of past cyber threats. All this information helps the relevant stakeholders to come up with safety measures and risk management strategies. The public also deserve to be given up to date accurate information. When the public are made aware of the threat of cyber attacks, they become more responsible and help in the fight against cyber warfare.
Role of Government and Private Sector
Homeland Agency is the government agency responsible for the protection of the United States from any home attacks. It is the duty of such agencies to work in close contact with the private sector organizations especially those that develop systems Softwares. When government agencies are made aware of the system software and their vulnerability, they can come up with policies to help infrastructural facilities to cope with any cyber threat. Not only do these mitigate the threat but also enable these two parties to work in coordination and identify their roles in the process.
Cyber self-defense enables the government to prosecute cyber cases through a special branch. Since such cases require a detailed understanding of how system softwares operate, working close with the private sector software developers and infrastructural stakeholders acting as consultants is vital. It becomes impossible to mitigate a problem without the necessary help. Partnership between these two sectors will ensure effective and efficient cyber self-defense plans.
IT

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Open Stack System
    Description: In computing, the perception of a highly scalable group of hardware and software resources has appeared as a sparkling star...
    20 pages/≈5500 words| 12 Sources | APA | Technology | Essay |
  • MS Project Plan Essay
    Description: The purpose of this project is to understand the workings and the function ability of the stated project culminating from the investigated works in the introduction of the official project...
    6 pages/≈1650 words| 23 Sources | APA | Technology | Essay |
  • Feasibility Study
    Description: The George’s agency is currently accepting proposals that seek to develop design and host the website of the Association...
    1 page/≈275 words| 3 Sources | APA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!