Black Ice Summary

Improved Essays
The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient.

All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure
…show more content…
Since 9/11, screening passengers, monitoring manifests and tracking planes have been top priorities for airlines, the Federal Aviation Administration, the Transportation Security Administration and regional port authorities.

Nevertheless, most responding to Information Security's critical infrastructure survey say that their industry/sector is better prepared for cyberattacks than they were prior to 9/11. The optimistic responses make sense, since protecting revenue-producing accesses through measured mechanisms and policies is good for business.

Situation Critical? In his 2003 book Black Ice, Dan Verton paints a frightening scenario in which terrorists launch a broad, coordinated attack using truck bombs to take out key telecom hubs and strategic hacks to disrupt response units' command and control. Using common hacking tools, the terrorists create chaos and successfully leverage the Internet as a force
…show more content…
Within 150 days of the date of this directive, the Secretary of Homeland Security, in coordination with the SSAs, other relevant Federal departments and agencies, SLTT entities, and critical infrastructure owners and operators, shall conduct an analysis of the existing public-private partnership model and recommend options for improving the effectiveness of the partnership in both the physical and cyber space. The evaluation shall consider options to streamline processes for collaboration and exchange of information and to minimize duplication of effort. Furthermore, the analysis shall consider how the model can be flexible and adaptable to meet the unique needs of individual sectors while providing a focused, disciplined, and effective approach for the Federal Government to coordinate with the critical infrastructure owners and operators and with SLTT governments. The evaluation shall result in recommendations to enhance partnerships to be approved for implementation through the processes established in the Organization of the National Security Council System

Related Documents

  • Improved Essays

    Abstract Stephen Flynn believes that there are goals of homeland security that are crucial to America’s bureaucracies and he senses that the country is wasting the chance to really protect the United States. Stephen discusses two crucial mistakes that he feels America has made and the first mistake is that he discusses is how homeland security is separated from national security. The two key intelligence agencies are not communicating. The second issue, he discusses is how our infrastructure is penetrable. In this lesson Stephen Flynn sees a problem with tactical thinking within the Department of Homeland Security (DHS).…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Soon after, the prevention and preparation of any future terrorism became a priority at all levels. Data revealed several new homeland security…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    To ensure our safety under the national security, we had to have partnership trust within our state, federal and local agencies. This made sharing information effective, that’s why we focus on the post 9-11 threat environment. To support preparedness efforts, there’re many of governmental, commercial, and non-governmental organizations that provide officials with homeland security alerts and updates along with state level government have fusion centers that integrate and analyze homeland security information. “The 9/11 terrorist attacks focused public attention on the need for better information sharing among intelligence, law enforcement, and emergency management agencies” (example 2016). The 9/11 Commission was a direct result in the agencies providing incentives for sharing, to restore a better balance between shared task, knowledge and security.…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Air Cargo Security Paper

    • 874 Words
    • 4 Pages

    Air Cargo Security Since the terrorist attacks on the United States on September 11, 2001, the air cargo industry has been struggling to find a balance between ensuring the security of the supply chain and remaining a smooth functioning, economically viable industry. The Department of Homeland Security (DHS) was given a goal to promote the efficient and secure movement of goods while fostering a global supply chain that is prepared for and can withstand threats and hazards, and recover quickly from disruptions (Homeland Security, 2015). To fulfill the security requirements put into effect after the 9/11 attacks, DHS mandated that 100% of all cargo would be screened before it departed on any aircraft; with a particular focus on passenger…

    • 874 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    PPD-21 gives each level of government sectors responsibilities to provide security to the critical infrastructures. The Federal government is responsible for strengthening the security and resilience of its own critical infrastructure and security and resilience efforts of critical infrastructure owners and operators (Presidential Policy Directive, 2013). Private sectors will abide by the federal government guidelines in protecting critical infrastructure. With both private and public sector working together, they can reduce vulnerabilities, minimize consequences, identify and get rid of risk/threats, and respond to crisis and recovery missions…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    A digitalized mode of terrorism known as cyber-terrorism has been devised. Cyber-terrorism is performed to destroy a computerized network system. These attacks target major corporations causing adverse effects on the corporation and all its stakeholders. Recruitment by terrorists targets the staff at these corporations who have…

    • 951 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Describe the C.I.A. triangle, which is founded on three desirable information characteristics: confidentiality, integrity, and availability. Page 7 To understand InfoSec one has to know how the C.I.A. triangle plays a part in it, the features are confidentiality, integrity, and availability, while looking at security technology it would seem like these three components are insufficient as a single part due to their limits in the ever changing IT environment their scopes are limited the needs in the IT field requires a more robust design. The development of the C.I.A. triangle is now a list of wide-range features and procedures that are vital, which covers privacy, identification authentication authorization, and accountability. The three discussed in this paper will be availability, confidentiality, and integrity (Whitman & Mattord, 2014).…

    • 399 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Cost Of Cyber Crime

    • 811 Words
    • 4 Pages

    According to former US Secretary of Defense (SECDEF) Leon E. Panetta, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11.” He further elaborated on the danger our cyber based society faces in an October 2012 meeting with business leaders, highlighting high profile cyber attacks that affected Saudi Arabia and Qatar’s energy sector. In this attack conducted by unknown actors “30 thousand computers integral to Saudi Arabia and Qatar’s energy sector were rendered useless”, and he warned that America 's critical infrastructure and corporations are in danger just as much if not more so than any other country in the world. In order to better understand the danger in which…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Cybersecurity Case Study

    • 1801 Words
    • 8 Pages

    As Bayuk location 387 (2012) points out, on-going communication and cooperation between the public and the private sectors will lead to a more resilient national cyber standing. As it stands today, data on cyber breaches and vulnerabilities are kept confidential and locked away. Not realizing how vulnerable various sectors are keeps managers in the dark about the threats facing their enterprise. Bayuk further emphasizes the need for closer collaboration…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The contribution to business practice will show how cyber-security in relation to cyber-attacks result in a profound impact on businesses and that implementing cyber security measures protects businesses from attacks (German, 2016). Therefore, businesses must understand that in light of recent world events, the cyber health and welfare of their customers are important, and not just for a consumer to business perspective. With the increase and scope of cyber-attacks, it becomes imperative that measures take place that safeguards the identities of individuals (Jenab, 2016). With the loss of $16 Billion from identity theft (Sen, 2015), as well as the 56 million users affected by a data breach in 2014 (Phair, 2014), it is incumbent on businesses to understand the detrimental effect such security breaches have not only on the particular business but the economy as a whole.…

    • 1147 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1). Cyber Attacks have become a modifying epidemic sweeping across the nation affecting any or almost all types of computer systems. In the past network, breaches were often kept quiet. The 2014 year broke the silents, as major department stores, government agencies, financial institutions, and software companies fall victim to the many attacks on our nation. These administrated attacks conducted by Russia and China presented devasting effects on our nation economy.…

    • 1138 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In today’s society, the rising number of security breaches leaves one to assume that breaches are inevitable and it is better to have a plan in place before incidents occur. Katherine Keefe, head of Beazley’s Breach Response Services, said “Getting one’s house in order and having the resources and team in place before an incident occurs is critical.” Therefore, it is important for all organizations to develop and follow a cyber incident response framework such as the illustration in Appendix D. The top priority should be an organization’s governance. This entails good communication on all levels, thorough and accurate documentation of policies, and cross-functional coordination.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather.…

    • 1615 Words
    • 7 Pages
    Great Essays