Black Ice Summary

Improved Essays
The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient.

All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure
…show more content…
Since 9/11, screening passengers, monitoring manifests and tracking planes have been top priorities for airlines, the Federal Aviation Administration, the Transportation Security Administration and regional port authorities.

Nevertheless, most responding to Information Security's critical infrastructure survey say that their industry/sector is better prepared for cyberattacks than they were prior to 9/11. The optimistic responses make sense, since protecting revenue-producing accesses through measured mechanisms and policies is good for business.

Situation Critical? In his 2003 book Black Ice, Dan Verton paints a frightening scenario in which terrorists launch a broad, coordinated attack using truck bombs to take out key telecom hubs and strategic hacks to disrupt response units' command and control. Using common hacking tools, the terrorists create chaos and successfully leverage the Internet as a force
…show more content…
Within 150 days of the date of this directive, the Secretary of Homeland Security, in coordination with the SSAs, other relevant Federal departments and agencies, SLTT entities, and critical infrastructure owners and operators, shall conduct an analysis of the existing public-private partnership model and recommend options for improving the effectiveness of the partnership in both the physical and cyber space. The evaluation shall consider options to streamline processes for collaboration and exchange of information and to minimize duplication of effort. Furthermore, the analysis shall consider how the model can be flexible and adaptable to meet the unique needs of individual sectors while providing a focused, disciplined, and effective approach for the Federal Government to coordinate with the critical infrastructure owners and operators and with SLTT governments. The evaluation shall result in recommendations to enhance partnerships to be approved for implementation through the processes established in the Organization of the National Security Council System

Related Documents

  • Improved Essays

    This standard specifies the resistance required for vehicle security barriers, which is also known as Hostile Vehicle Mitigation or HVM. Barriers used in the United Kingdom must meet this standard of protection. In the United States, various standards apply including the Department of State, Department of Defense, U.S. Army Corps of Engineers and various city and state governments. New York City standards are among the most complex because they involve protecting skyscrapers while allowing public access.[2] Considerations for Installing Security Bollards Like any security product, there 's a tradeoff when installing security bollards that involves confidentiality issues, security parameters and choosing between premade bollards or authorizing…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Air Cargo Security Paper

    • 874 Words
    • 4 Pages

    Air Cargo Security Since the terrorist attacks on the United States on September 11, 2001, the air cargo industry has been struggling to find a balance between ensuring the security of the supply chain and remaining a smooth functioning, economically viable industry. The Department of Homeland Security (DHS) was given a goal to promote the efficient and secure movement of goods while fostering a global supply chain that is prepared for and can withstand threats and hazards, and recover quickly from disruptions (Homeland Security, 2015). To fulfill the security requirements put into effect after the 9/11 attacks, DHS mandated that 100% of all cargo would be screened before it departed on any aircraft; with a particular focus on passenger…

    • 874 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Public-private partnerships are “effective for critical infrastructure protection and resilience strategies, and that timely, trusted information sharing among stakeholders is essential to the security of the nation’s critical infrastructure” (Homeland Security, 2006). The National Infrastructure Protection Plan (NIPP) creates a plan that that allows a partnership in protecting the critical infrastructure between federal, state, regional, local, tribal, territorial, and international governments to work with each other and…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Vulnerabilities and threats to Critical Infrastructures and other related risks have been recognized for a long time. Since 1997, critical infrastructure has been a great concern. “Critical Infrastructure is classified as a National Concern because of its scope and its importance to the nation.” () There seem to be fourteen areas of infrastructures that require protection from threats. These areas are Transportation, Food, Water, Public Safety, Government, Emergency services, Finance and much more, these infrastructures are essential to the economy because they provide goods and services to the economy and national defense.…

    • 113 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    A digitalized mode of terrorism known as cyber-terrorism has been devised. Cyber-terrorism is performed to destroy a computerized network system. These attacks target major corporations causing adverse effects on the corporation and all its stakeholders. Recruitment by terrorists targets the staff at these corporations who have…

    • 951 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Describe the C.I.A. triangle, which is founded on three desirable information characteristics: confidentiality, integrity, and availability. Page 7 To understand InfoSec one has to know how the C.I.A. triangle plays a part in it, the features are confidentiality, integrity, and availability, while looking at security technology it would seem like these three components are insufficient as a single part due to their limits in the ever changing IT environment their scopes are limited the needs in the IT field requires a more robust design. The development of the C.I.A. triangle is now a list of wide-range features and procedures that are vital, which covers privacy, identification authentication authorization, and accountability. The three discussed in this paper will be availability, confidentiality, and integrity (Whitman & Mattord, 2014).…

    • 399 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    1 Our Understanding Telos Corporation (Telos) protects some of our country’s most security-conscious agencies and has established an excellent reputation. However, the company is not well known outside of government circles. Telos security solutions can benefit businesses as well as government agencies. As you know, cyber security breaches have had a profound impact on commerce and infrastructure.…

    • 1140 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Introduction Defined by the Patriot Act of 2001, critical infrastructures are; "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters" (107th Congress, 2001). The National Infrastructure Protection Plan: Partnering for Critical Infrastructure Security and Resilience (NIPP 2013) guides the national effort managing risks that may threaten our Nation’s critical infrastructure. The NIPP identifies 16 critical infrastructure sectors (derived from PPD-21) which are vital to our Nation. These critical infrastructures…

    • 1537 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cost Of Cyber Crime

    • 811 Words
    • 4 Pages

    According to former US Secretary of Defense (SECDEF) Leon E. Panetta, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11.” He further elaborated on the danger our cyber based society faces in an October 2012 meeting with business leaders, highlighting high profile cyber attacks that affected Saudi Arabia and Qatar’s energy sector. In this attack conducted by unknown actors “30 thousand computers integral to Saudi Arabia and Qatar’s energy sector were rendered useless”, and he warned that America 's critical infrastructure and corporations are in danger just as much if not more so than any other country in the world. In order to better understand the danger in which…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cybersecurity Case Study

    • 1801 Words
    • 8 Pages

    At times, various agencies play conflicting roles. Clearly wide gaps between the Department of Homeland Security, DoD, the intelligence community, and organizations such as NIST remain. Some provisions of the proposed legislation have been implemented, such as the creation of Cyber Threat Integration Center, announced February 2015, whose limited role is to assess and coordinate sharing of the threat data amongst various…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The contribution to business practice will show how cyber-security in relation to cyber-attacks result in a profound impact on businesses and that implementing cyber security measures protects businesses from attacks (German, 2016). Therefore, businesses must understand that in light of recent world events, the cyber health and welfare of their customers are important, and not just for a consumer to business perspective. With the increase and scope of cyber-attacks, it becomes imperative that measures take place that safeguards the identities of individuals (Jenab, 2016). With the loss of $16 Billion from identity theft (Sen, 2015), as well as the 56 million users affected by a data breach in 2014 (Phair, 2014), it is incumbent on businesses to understand the detrimental effect such security breaches have not only on the particular business but the economy as a whole.…

    • 1147 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1). Cyber Attacks have become a modifying epidemic sweeping across the nation affecting any or almost all types of computer systems. In the past network, breaches were often kept quiet. The 2014 year broke the silents, as major department stores, government agencies, financial institutions, and software companies fall victim to the many attacks on our nation. These administrated attacks conducted by Russia and China presented devasting effects on our nation economy.…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why is Cyber Security a rising priority? Cyber security has always been a huge concern ever since the internet came out. There are 3 main branches of Cyber Security: Confidentiality, Integrity, and Accessibility. Every cybercrime out there violates one of these branches. Confidentiality deals with information that isn’t accessible to the public, Integrity deals with information that has been altered, and Accessibility deals with something being able to access.…

    • 1715 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    In today’s society, the rising number of security breaches leaves one to assume that breaches are inevitable and it is better to have a plan in place before incidents occur. Katherine Keefe, head of Beazley’s Breach Response Services, said “Getting one’s house in order and having the resources and team in place before an incident occurs is critical.” Therefore, it is important for all organizations to develop and follow a cyber incident response framework such as the illustration in Appendix D. The top priority should be an organization’s governance. This entails good communication on all levels, thorough and accurate documentation of policies, and cross-functional coordination.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather.…

    • 1615 Words
    • 7 Pages
    Great Essays