Cybersecurity: Critical Infrastructure Control Systems Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The implementation of innovative measures guaranteeing cybersecurity at personal and governmental levels is complicated by the presence of numerous tasks which should be addressed for their effectiveness. They correspond to the emerging threats and are intended to combat them; meanwhile, the feasibility of approaches suggested for this purpose is frequently dubious from numerous perspectives (Johnson, 2015). Thus, distinguishing between individuals or entities, which are to be affected, and evaluating the possibility of new threats posed by the creation of instruments aimed at resolving the most critical issues are important initiatives. The mentioned conditions explaining the need for a thorough consideration are complemented by a variety of factors related to underlying processes and global projects in this respect.

Processes Behind Developing Cybersecurity

Ensuring the safety of all procedures in cyberspace incorporates several stages correlating with the requirements of the environment. It means that the suggested interventions are to be carefully analyzed before their use in order to prevent adversities for some populations or organizations. Generally, the neglect of one or another stakeholder might lead to increasing risks for them (Johnson, 2015). Hence, introducing any approaches to securing online resources without paying attention to this rule is unacceptable from the standpoint of the common good. Meeting the needs of all participants is a difficult aspect of the matter, and it is addressed by the processes accompanying the creation of tools for protecting data.

The most vital stages of this nature include the analysis of the situation, the assessment of goals to make sure that they are realistic, and the expected effectiveness of implementing new policies. First, specialists evaluate the priorities as per the emerging threats, which are to be combatted by the shifts in the ways cybersecurity is guaranteed, implying new measures specifically designed for the most critical hazards (Johnson, 2015). Second, IT teams develop strategic plans aimed at timely preventing any negative outcomes by quickly responding to the changing circumstances of the environment (Tarun, 2018). Third, the requirement to test the suitability of suggested programs is met by collecting and analyzing data concerning the correspondence of intentions to ultimate results (Tarun, 2018). In this way, the main processes behind cybersecurity are represented by these three areas that are equally important for guaranteeing the safety of targetted information.

Cybersecurity Policies and National Security Objectives

Alongside the mentioned mechanisms, policies in this field are powerful tools for enhancing national security objectives. Historically, this need was not underpinned by legal provisions, which were substituted by separate executive orders, but they were consequently complemented by federal laws, providing a sufficient basis for taking action (Lowrie, 2017). Currently, the decisions made for the benefit of the government are guided by these documents as well as international initiatives (Lowrie, 2017). The recent reports show that cybersecurity programs are mainly presented by industrial control systems and infrastructure performance goals, providing for preventive measures in the first place (Biden, 2021). In other words, the link between national security objectives and cybersecurity initiatives is in the latter’s correlation with the former’s capability of making improvements in the existing instruments.

Conclusion

To summarize, the most significant processes behind developing cybersecurity are the analysis of situations, the evaluation of expected outcomes, the consideration of applicable tools, and prioritizing individuals or entities in developing programs. They are maintained by the specialists, who are guided both by ethical and technical factors, thereby contributing to the suitability of measures to different objectives. Meanwhile, at the national level, their efforts are essential for improving the existing mechanisms guaranteeing cybersecurity. Thus, the professionals’ responsibility is increased by the understanding that they play a critical role in governmental affairs as the protection of data is possible only when appropriate solutions are timely introduced.

References

Biden, J. R. Jr. (2021). . The White House.

Lowrie, J. (2017). Cybersecurity: A primer of U.S. and international legal aspects. In A. N. Guiora (Ed.), Cybersecurity: Geopolitics, law, and policy (pp. 199-254). Routledge.

Johnson, T. A. (2015). Development and implementation of cybersecurity policy. In T. A. Johnson (Ed.), Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare (pp. 70-88). CRC Press.

Tarun, R. (2018). CSO.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, February 27). Cybersecurity: Critical Infrastructure Control Systems. https://ivypanda.com/essays/cybersecurity-critical-infrastructure-control-systems/

Work Cited

"Cybersecurity: Critical Infrastructure Control Systems." IvyPanda, 27 Feb. 2023, ivypanda.com/essays/cybersecurity-critical-infrastructure-control-systems/.

References

IvyPanda. (2023) 'Cybersecurity: Critical Infrastructure Control Systems'. 27 February.

References

IvyPanda. 2023. "Cybersecurity: Critical Infrastructure Control Systems." February 27, 2023. https://ivypanda.com/essays/cybersecurity-critical-infrastructure-control-systems/.

1. IvyPanda. "Cybersecurity: Critical Infrastructure Control Systems." February 27, 2023. https://ivypanda.com/essays/cybersecurity-critical-infrastructure-control-systems/.


Bibliography


IvyPanda. "Cybersecurity: Critical Infrastructure Control Systems." February 27, 2023. https://ivypanda.com/essays/cybersecurity-critical-infrastructure-control-systems/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1