15 Jun 2022

129

Protecting Critical Infrastructure- Information Technology Sector

Format: APA

Academic level: Master’s

Paper type: Capstone Project

Words: 523

Pages: 2

Downloads: 0

According to Alcara z and Z eadally (2015), critical infrastructure consists of assets and systems (virtual or physical) that determine economic well-being, national security, and public health safety. According to CISA (2019), the destruction of these assets and systems has debilitating effects on the nation as it may paraly z e security, public health, or the nation's economy. Critical infrastructure is subject to both natural and human-made threats and ha zards . Therefore, protecting essential infrastructure should be a priority for governments and all stakeholders . It is important to ensure its security and resilience. 

According to Alcara z and Zeadally (2015), sixteen sectors make up the critical infrastructure. Among them is the information technology sector. According to CISA (2019), the department of homeland security is in charge of the information technology sector. According to Nikiloski (2014), information technology (IT) is the system that is used to automate and support business decision-making and overall tasks. These systems include software, hardware, networks, and computers. With IT, routine tasks, schedules, and logistics are automated, enabling organizations to function efficiently and profitably. It allows the storage, transmission, retrieval, and manipulation of information and data. The evolution and innovation of IT have increased productivity. New services and products have been introduced on the market, benefiting the entire world. Most sectors, businesses, organizations, and agencies use IT to run their activities. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

These new possibilities have also given rise to further problems. For a long time now, IT security has been a major problem worldwide when it comes to securing the information systems, the transmission and storage of information, and the processes involved. Let us take an example of the banking system. For over fifty years now, banks have been carrying out major transactions in electronic form. This has provided an opportunity for criminals to execute plans to compromise these systems' functioning for personal gain. We have experienced a breach of accounting information security and witnessed many electronic financial manipulations. According to Sadowsky et al. (2003), research and development initiatives have been launched to provide more robust security measures. However, millions of people worldwide have access to computers, and with the internet enabling computer-to-computer communications, trouble spots have become more rampant. Previously, computers were used by specialists, unlike today, where most of the users are not concerned with the technical details of the networks and the computers (Sadowsky et al., 2003). This has posed a great risk in the security and resilience of IT. 

IT has become a significant and vital concept in society. It has many advantages, not only to individuals and businesses. Government units rely on it for services such as accounting. According to CISA (2019), security involves reducing risk, be it human-made or natural, such as attacks or intrusions, to critical infrastructure. Security is achieved by the application of defensive cyber measures or other physical means. The success of a business depends on its environment. At this point, technology envelopes the environment of any business. According to Osterwalder and Pigneur (2010), any business model's building blocks include a value proposition, customer relationships, and channels, all of which highly depend on technology. 

In conclusion, critical infrastructure is the foundation of our daily functions. The IT sector plays a big role in the efficiency of our businesses and activities. Its protection is vital. My idea for the project is to develop proper ways and measures of ensuring the IT sector's safety to reduce the risks. 

References  

Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International journal of critical infrastructure protection , 8 , 53-66. 

CISA (2019) A Guide to Critical Infrastructure Security and Resilience. Retrieved on 16 th March from www.cisa.gov 

Nikoloski, K. (2014). The role of information technology in the business sector. International Journal of Science and Research (IJSR) , 3 (12). 

Osterwalder, A., & Pigneur, Y. (2010). Business model generation: a handbook for visionaries, game changers, and challengers . John Wiley & Sons. 

Sadowsky, G., Dempsey, J. X., Greenberg, A., Mack, B. J., & Schwartz, A. (2003). Information technology security handbook . Washington, DC: World Bank. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Protecting Critical Infrastructure- Information Technology Sector.
https://studybounty.com/protecting-critical-infrastructure-information-technology-sector-capstone-project

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration