This helps in case of an attack because the data is not tampered with. To ensure the success if this strategy, the organizations have also developed certain security tools that can help the organization in detecting intrusions as well as prevent them. These range from antivirus software to other sophisticated intrusion detection and deterrence tools. These have become very important because they not only help governments in securing information in cyberspace but also help in providing data concerning the most recent ways that criminals are using in attempting intrusions (Lewis, 2006). This is then used to help in devising ways to prevent such attacks. The only way that this succeeds is through collaboration between the private and the public sectors. Through collaboration, information is shared. Sharing of information and collaborating efforts is also another way of securing critical infrastructure. In sharing information, both private and public sectors are able to acquire information regarding the most recent attack methods as well as ways of protecting their systems. If collaboration is not done, both sectors risk losing data and clients if information is leaked. Analysis of Critical Infrastructure: Cybersecurity.
Cornish, P., & Royal Institute of International Affairs. (2011). Cyber security and critical national infrastructure. London, England: Chatham House.
Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Waltham, MA: Morgan Kaufmann.
Lewis, T. G. (2006). Critical infrastructure protection in homeland security: Defending a networked nation. Hoboken, N.J: Wiley & Sons.
Wilshusen, G. C. (2011). Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure and Federal Information Systems: Congressional Testimony. Darby: DIANE Publishing.
Please type your essay title, choose your document type, enter your email and we send you essay samples