Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Analysis of Critical Infrastructure: Cybersecurity Essay Example

Show related essays

Analysis of Critical Infrastructure: Cybersecurity

This is a preview of the 5-page document
Read full text

Analysis of Critical Infrastructure: Cybersecurity. Governmental and non-governmental organizations have come up with ways of securing information in the cyber sector so as to limit unauthorized access to information. These strategies are geared towards limiting because in an advancing world, vulnerabilities are bound to continue developing as criminals attempt to break into computer systems on a daily basis. One of the most common ways of securing the information is through virtualization. This is one of the most effective ways of discouraging an attacker and prompting them to look elsewhere for systems to attack. This is because virtualization makes a computer system to appear as virtual but not a real system. In addition, it functions as a way of isolating the data from the main network to reduce the effect of an attack event.

This helps in case of an attack because the data is not tampered with. To ensure the success if this strategy, the organizations have also developed certain security tools that can help the organization in detecting intrusions as well as prevent them. These range from antivirus software to other sophisticated intrusion detection and deterrence tools. These have become very important because they not only help governments in securing information in cyberspace but also help in providing data concerning the most recent ways that criminals are using in attempting intrusions (Lewis, 2006). This is then used to help in devising ways to prevent such attacks. The only way that this succeeds is through collaboration between the private and the public sectors. Through collaboration, information is shared. Sharing of information and collaborating efforts is also another way of securing critical infrastructure. In sharing information, both private and public sectors are able to acquire information regarding the most recent attack methods as well as ways of protecting their systems. If collaboration is not done, both sectors risk losing data and clients if information is leaked. Analysis of Critical Infrastructure: Cybersecurity.

This is a preview of the 5-page document
Open full text

References

Cornish, P., & Royal Institute of International Affairs. (2011). Cyber security and critical national infrastructure. London, England: Chatham House.

Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Waltham, MA: Morgan Kaufmann.

Lewis, T. G. (2006). Critical infrastructure protection in homeland security: Defending a networked nation. Hoboken, N.J: Wiley & Sons.

Wilshusen, G. C. (2011). Cybersecurity: Continued Attention Needed to Protect Our Nation’s Critical Infrastructure and Federal Information Systems: Congressional Testimony. Darby: DIANE Publishing.

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Technology, Military
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire a Writer
preview essay on Analysis of Critical Infrastructure: Cybersecurity
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us