Friday, March 29, 2019

Communications Sector Infrastructure

Communications welkin homeCommunication exchange system has become a crucial comp anent in our lives today. Many businesses have thrived in connection with a viable chat system. This is a way in which a marketer has seen his dissipated optimize and maximize profits as a actual interaction between him, and the consumer is enabled by the availability of intercourse system. Apart from that converse sector prevails in scene of actions such as auspices measures division, finance segment, transfer of training department and many other critical sectors (Lewis, 2014). The finance department requires communication infrastructure in conjunction with other junior departments in harmonizing monetary records as well as monetary gains from the business. Transportation department presently is being controlled using communication infrastructure in setting stretch and departure time for various journeys (DHS, 2015).Communication connections are mostly hound by the orphic sector i n the presence of doggedness guidance beak (CGC) which offers directions to the Non-Federal governing bodys (NFGs) on how to ensure the effectiveness of the program (FEMA, 2013). This circular encompasses both forms of organizations from tribal, local government, territorial and other non-governmental forms. All forms of communication are unified into one unit and fed into the system using the internet (FEMA, 2013). This communication platform has evolved in proportional to cyber-attack. This is a panic lagging mystical sector behind in public exposure of quality services to its members. It is no doubt that many solids do not consider to carry place research on how well to protect their communication systems in persona of an attack. All that they concentrate on is the profits to be collected (Etzioni, 2011). This is one of the many weaknesses many firms face and the issue needs to be addressed. Still, the transitions in the communication technology platform have positive ly yielded success on the part of hackers who are in the frontline of innovations progress (DHS, 2015).Due to increased show windows of hacking, the private sectors are left with no idea in which to discharge their responsibilities properly. interconnection of computers to perform a exchange task has canvassd unworthy regardless of many experts put in place to control the system (Raed Keating, 2014). This implies that consumers do not get their ordered products on time or else they deficiency randomness concerning a fresh product which expertness have been introduced in the market by their respective firms. This form of cyber-attack may come in as a result of competition for market domination by various antagonistic investors (Etzioni, 2011).Program GoalsUnited States retains two guiding programs perseverance of Government (COG) and Continuity of Operations (COOP) which lay a foundation upon which each goal and vision of a given organizations are determined (DHS, 2015). This withal ensures that citizens are offered only those services essential to them. In this case, all objectives, goals, and visions of the firm need to be reviewed. The private sector faecal matternot solve the problem of cyber stealth if the entire member companies do not comprehend the driving get to their business venture (Stergiopoulos et al., 2017). In 2008, George W. Bush signed Comprehensive study Cyber Security Initiative (CNCI) to secure communication attack for current and hereafter economy. He urged all the stakeholders to focus on one goal, and that is cyber threats reduction (Hennig Rollins, 2009). Also, the balance was cemented on the causal agent of how the member firms and federal governments shared benefits. All goals of a business are met by satisfying the consumer needs. This assessment is important to the stakeholders in sending the right information to the government for the arrangement of support provision. It excessively indicates how many objectiv es the firm has been able to achieve during the subroutine period (Hennig Rollins, 2009). assoil of Duties and Monitoring of StaffNational Institute of Standard and Technology (NIST) department to set peculiar critical standards upon which communication infrastructure would be conducted (DHS, 2015). The separate issue is how go acrossership is done and c drop offs monitoring of the staff. Todays private sector should bear all the necessary information concerning the best infrastructure platform which would other than cope with cyber-attack menace (Knapp Langill, 2014). This is possible through the in-depth search of information the hackers might be using in lagging the economy behind. Once this information is collected, a firm background in collaboration with the government should be laid. This could only be achieved by enhancing a new database with new security coding system that could easily be manned from a central point (Knapp Langill, 2014).The databases should be enable d with data tracking mechanisms to detect all the specifications and the identity element of any intruder into the system (Kotzanikolaou et al., 2013). The operating staff and their information should be easily monitored should there be information leakage, tracing of the culprit testament be easy. The government in line with the private sector should overthrow harsh rules that will apply to anyone who tries the cyber attack on all thou (DHS, 2015). Again the consumers should be included in decision-making to ensure that the implementation of new communication system doesnt throw them out of business on the grounds of its operation and the guidelines.Communication Technology AssessmentIn every looking of business operation, the introduction of a new mechanism of services is confine to yield setbacks which in this case are referred as risks. One of the sterling(prenominal) risks a private sector should be aware of is the ability to lose some of the stakeholders (Yan et al., 20 13). This comes with new doctrines that would guide the operations of the system in securing a given department. For instance, change in the systems in the security department may imply that some of the operators have to be axed since the new system is competent of operating various sections that were earlier performed by different personnel. This is a strong threat since the fired individuals might be containing critical information that would interject with the safety of department in case they decide to retaliate. encounter military ratingThe magnitude of a threat to the new system should be evaluated. In the security department, for instance, the axing of various departments and their operation staff should be closely reviewed. Because these experts quiesce contain many secrets of the entire security staff, the option to send them domicile is utterly inappropriate. This is supported by the argument that in situations of retaliation by this group. In the government sector, a threat may jounce consummate(a) consequences due to its broadness in management train and corruption scenario which ashes to be a significant threat to success. Risk assessment can still be determined by the loss a firm will incur regarding devotion and money.Risk ManagementThis is another area that requires attention in determining how the cyber-attacks can be managed. Application of approaches that lead to quality progress and effectiveness of the program should be the guiding principle of the government (FEMA, 2013). Registering, scanning and monitoring every step the operating squad undertakes is another important measure to mitigate cyber theft. Still, on that ground, security department should strictly observe the person entitled to run the system (May Koski, 2013The rush to improve the communication system targeting their counterparts will probably be aborted in the main through leaking of information. The system should be designed in a trend that it wont access any codes from outside the base. Just in case the hackers succeed in collapsing the system, the whole system should be set in a manner which destroys everything. This will assist in controlling cyber attacks in many fields of operation.Assessment of Programs ReadinessThe success of the whole operation should be measured by looking at how the business is running. In the case of improved profit margins and customer satisfaction, the operation of the system should prove applicable. This is contributed by strong leadership originating from senior positions at the junior level (Younis Kifayat, 2013). On the other hand, if the system runs in a reverse manner, it implies that the cases of cyber threat were not controlled. The firm and the government should work on adding more fellowship and pooling resources together to curb losses which would deteriorate the economy.It is crucial for business and security firms to move with technological advancements that are changing on a quotidian basis . It is a wise decision to do away with out of regard technologies that are prone to cyber-attacks and embrace those which are secured against such threats. Communication infrastructure forms an integral part of any company and has a direct impact on performance. As such, maintaining the integrity of the infrastructure is critical. The Continuity Guidance Circular (CGC) offers directions to Non-Federal Governments (NFGs) on how to ensure the effectiveness of the program. The CGC provides a guideline on the dissemination of duties, continuous assessment of the infrastructure, risk management, and evaluation and also the assessment of the programs facility (FEMA, 2013).ReferencesDepartment of native land Security, (2015). Communications Sector-Specific Plan an Annex to the NIPP 2013. Retrieved from https//www.dhs.gov/sites/default/files/ military issues/nipp-ssp-communications-2015-508.pdfEtzioni, A., (2011). Cybersecurity in the Private Sector. Issues in Science and Technology. Re trieved from http//issues.org/28-1/etzioni-2/Federal Emergency Management Agency, (2013). Continuity Guidance Circular 1 (CGC 1) Continuity Guidance for Non-Federal Governments (States, Territories, Tribes, and Local Government Jurisdictions). Retrieved from https//www.fema.gov/media-library-data/1386609058803-b084a7230663249ab1d6da4b6472e691/CGC-1-Signed-July-2013.pdfHennig, A Rollins, J., (2009). Comprehensive National Cybersecurity Initiative Legal Authorities and policy Considerations. Congressional Research Service. Retrieved from https//fas.org/sgp/crs/natsec/R40427.pdfKnapp, E. D., Langill, J. T. (2014). Industrial Network Security Securing Critical Infrastructure networks for the voguish grid, SCADA, and other Industrial Control Systems. Syngress. Retrieved from http//library.books24x7.com.ezproxy2.apus.edu/toc.aspx?bookid=77754Kotzanikolaou, P., Theoharidou, M., Gritzalis, D. (2013). Assessing n-order dependencies between critical infrastructures. multinational Journa l of Critical Infrastructures 6, 9(1-2), 93-110Lewis, T. G. (2014). Critical Infrastructure Protection in Homeland Security. Somerset John Wiley Sons, Incorporated. Retrieved from http//ebookcentral.proquest.com.ezproxy2.apus.edu/lib/apus/detail.action?docID=1813343May, P. J., Koski, C. (2013). Addressing public risks Extreme events and critical infrastructures. reassessment of Policy Research, 30(2), 139-159. Retrieved from http//onlinelibrary.wiley.com.ezproxy2.apus.edu/doi/10.1111/ropr.12012/fullRaed, M. J., Keating, C. B. (2014). The fragility of oil as a critical infrastructure problem. International Journal of Critical Infrastructure Protection, 7(2), 86-99. Retrieved from https//pdfs.semanticscholar.org/745d/aa0b70a3e6ced165add2435036ab903bc999.pdfStergiopoulos, G., Kotzanikolaou, P., Theocharidou, M., Gritzalis, D. (2017). Risk Mitigation for Critical Infrastructures AUEB INFOSEC Lab Initiatives. Retrieved from https//infosec.aueb.gr/Publications/Risk-Tea%202017A%20CIP.p dfYan, Y., Qian, Y., Sharif, H., Tipper, D. (2013). A survey on smart grid communication infrastructures Motivations, requirements, and challenges. IEEE Communications Surveys Tutorials, 15(1), 5-20. doi10.1109/SURV.2012.021312.00034Younis, M. Y. A., Kifayat, K. (2013). Secure cloud figuring for critical infrastructure A survey. Liverpool John Moores University, United Kingdom, Tech. Rep. Retrieved from https//www.researchgate.net/profile/Younis_A_Younis/publication/262817790_Secure_Cloud_Computing_for_Critical_Infrastructure_A_Survey/links/5465ed3e0cf2f5eb180130d5.pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.