Annotated Bibliography – Protecting the National Infrastructure
Verified
Added on 2023/04/25
|6
|1377
|485
AI Summary
This annotated bibliography discusses the national infrastructure protection plan for the US, outlines how a national infrastructure can be protected against hackers, and identifies possible risk areas by trying to exploit the system.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Annotated Bibliography – Protecting the National Infrastructure Student’s name Institution Affiliation(s)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J. (2018). Cyber security of critical infrastructures.ICT Express,4(1), 42-45. The article discusses the national infrastructure protection plan for the US. The plan includes the comprehensive risk management system which explicitly defines roles and responsibilities. The plan has emphasized the integration of the resilience element together with the utilization of a common risk assessment method which is inclusive of the main criteria for these kinds of analyses in order to allow the comparative analyses of risk factors amongst various industries. The paper is useful for my research as it contains a detailed national infrastructure protection plan for the US. The plan is one of the most detailed plans available thereby ensuring that the essential elements of cyber security are discussed and demonstrated accordingly. Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks.PloS one,11(2), e0148674. Cyberwar has turned into an intriguing issue, primarily because of the weakness of the basic national framework over which every single industrialized country depends on. Various ongoing assaults have featured the need of making a move, yet it supports for some effort to supplant old control frameworks that were planned before the age of the Internet. A key European activity called Ecossian is currently being chipped away at to go about as a new cautioning framework. The paper is useful for my research as it contains vital information about protecting critical national infrastructures. Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network Security,2017(3), 8–10. Retrieved from:https://doi.org/10.1016/S1353-4858(17)30026-0
Because of the propelling abilities of programmers and the constantly reducing efficiency of common border security arrangements, national body of administrators must look towards advancement to delve into and subsequently major digital security lapses. These problems will develop quite rapidly and massively after some time. Any kind of change or a new idea has their own challenges. However digital security should be handled in an outright manner if the authorities in charge of providing our perfect water, fuel and power can be trusted as proactively handling this complex issue. Hacking has become very rampant leading to the introduction of ethical hacking. The paper is useful for my research as it outlines how a national infrastructure can be protected against hackers. Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges.Computers & security,49, 70-94. Ninety-eight per cent of all U.S. government correspondences travel over nonmilitary personnel claimed and-worked systems. Furthermore, the administration depends entirely on regular citizen suppliers for PC programming and equipment items, administrations, and upkeep. This close total intermixing of nonmilitary personnel and military PC foundation makes a significant number of those nonmilitary personnel items and suppliers genuine focuses under the law of outfitted clash. This is another text that is useful for my research in that it talks about precautions against the effects of any attacks n the national infrastructure.
Nye, J. S. (2018). Normative restraints on cyber conflict.Cyber Security: A Peer-Reviewed Journal,1(4), 331-342. There gives off an impression of being an unfolding acknowledgement that a significant part of the foundation on which we as a whole depend, for example, the power network that furnishes us with power, is totally unable to deal with programmers. In recent years, there have been rehashed alerts – and a couple of effective assaults. It isn't so much that these threats were obscure to experts in the field. This research paper outlines the weaknesses that our national infrastructures have. For most systems, because individuals have programmed them, then it means that these systems remain defenseless to those programmers. Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection attacks against modern power systems.IEEE Transactions on Smart Grid,8(4), 1630- 1638. Progressively, our basic framework is overseen and constrained by PCs, and the data organizes that interface them. Digital psychological militants and different malignant performers comprehend the financial and social effect that a fruitful assault on these frameworks could have. While it is basic that we shield against these attacks, it is similarly basic that we understand how best to respond them. The article shows the most grounded way strategy of investigating all pathways of introduction to chance – regardless of how roundabout or circumlocutory they might be – in a system model of foundation and tasks. This paper outlines how to identify possible risk areas by trying to exploit the system. This is where organizations hire ethical hackers to test the system for any vulnerabilities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A review on internet of things for defense and public safety.Sensors,16(10), 1644. Following mass demos against Egyptian President Hosni Mubarak's routine, the Egyptian government shut off Internet access the nation over, a move remarkable in the history of Internet. Even though the coordination of Egypt's "Internet kill switches" stay foggy, the occasion has set the phase for a genuine discussion about cyber security problems inside the US, regardless of whether the government ought to be offered access to its very own kill switch. This makes part of my research as it talks about nations having kill switches for systems. For instance, The US can have one single switch to power on and off the power grid of the whole country.
References Cho, J. H., & Gao, J. (2016). Cyber war game in temporal networks.PloS one,11(2), e0148674. Fraga-Lamas, P., Fernández-Caramés, T., Suárez-Albela, M., Castedo, L., & González-López, M. (2016). A review on internet of things for defense and public safety.Sensors,16(10), 1644. Henderson, L. (2017). National infrastructure – the next step for seasoned hackers.Network Security,2017(3), 8–10. Retrieved from:https://doi.org/10.1016/S1353-4858(17)30026-0 Liang, G., Zhao, J., Luo, F., Weller, S. R., & Dong, Z. Y. (2017). A review of false data injection attacks against modern power systems.IEEE Transactions on Smart Grid,8(4), 1630-1638. Maglaras, L. A., Kim, K. H., Janicke, H., Ferrag, M. A., Rallis, S., Fragkou, P., ... & Cruz, T. J. (2018). Cyber security of critical infrastructures.ICT Express,4(1), 42-45. Nye, J. S. (2018). Normative restraints on cyber conflict.Cyber Security: A Peer-Reviewed Journal,1(4), 331-342. Robinson, M., Jones, K., &Janicke, H. (2015). Cyber warfare: Issues and challenges.Computers & security,49, 70-94.