Saturday, May 4, 2019
Should base level funding for critical infrastructure protection Research Paper
Should install level funding for critical root word protection against foreign terrorists organizations include house servant (internal) threats - Research Paper Exampleously increased their capacities in terms of sophistication and potential damage, there is aim to take necessary steps to guard key infrastructures both private- and publicly owned against these developments. In tell apart to effectively tackle cases of terroristic attacks against CI, base level funding for protection against foreign terrorist organizations should include domestic or internal threats.Indeed in todays modern world, without critical infrastructure a federation cannot function optimally. In fact, it is only in times of peace and relative security that critical infrastructures be characteristically, for granted taken. It must however be appreciated that when one critical infrastructure is annihilated, the entire ground somehow feels the effects of the loss (ITAC, 2006). In some cases, the loss may be as capacious in magnitude as to affect one or more countries significantly.Owing to their significance, critical infrastructures are always naturally become vulnerable targets for terrorists foreign or those that exist within the nations borders (ITAC, 2006). It is in appreciation of this fact that the government in conjunction with its citizens and other stakeholders must always match that these infrastructures remain secure and function properly. In the US, currently, there is no clear policy as to how base level funding should be used. This therefore means that in cases of need, funding meant for foreign terrorist protection could be used to solve issues related to domestic threats.While terrorist gangs have often resorted to using bombs and other fierce methods, it must be appreciated that they are likely to change tactics soon or later. instead of engaging in physical combat, terrorists may opt to target information systems and other cyber assets in an unique way. This could of course have a devastating effect since most of the countrys critical infrastructure is run or controlled by computers which in most cases are networked (ITAC,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment