Site icon

Cybersecurity: Critical Infrastructure Analyses 2020

Critical Infrastructures in 2020

Interdependency and Economic Models

Throughout my research, I evaluated and analyzed all 16 critical infrastructures, the importance to our nation and abroad, as well as how to identify and mitigate any vulnerabilities present within the CIs. My studies provided an analysis on each sector and highlighted a few of them due to their interdependent nature to our economy and national security. After studying each CI, it became apparent that mitigation and future policy development were significant components of each sector. One of my favorite studies was on critical infrastructure models; I believe that the two most important models are the interdependency model and economic model. The interdependency model gives policy-makers a visualization on how critical infrastructures intersect with each other, causing security challenges and the need for proper training and use of technology in order to keep all areas functional. I think the economic model is important for private and public entities who want to discover how the implementation of cybersecurity policies will impact an organization’s budget.

New Laws

Cybersecurity impacts all areas of public and private affairs; it is even something that can affect people on a personal basis due to the widespread use of computers and mobile devices among today’s consumers. This exposes individuals and organizations to various kinds of state and non-state actors that may look to gain financial resources, control critical infrastructure or launch cyberwar. According to Richard Clarke, the United States has a long way to go to enforce laws against cyber activity within the country. The author believes that the United States should implement several national and international laws that will allow the country to go after cybercriminals on any level throughout the United States.

Enforcement

Even though Clarke airs on the side of protecting the American consumer, it would be safe to assert that such policies would lack the enforcement components necessary to go after every cybercriminal in every instance of attack. In the absence of these policies and the United States’ great dependency on many critical infrastructures and technological devices, it would be safe to agree with Clarke that we are the most dependent and thereby most vulnerable nation on earth.

Peace Treaties

Private industry is currently adopting the best policies it can; for example, the 2014 NIST Framework signed under the Obama Administration remains a frequent policy installed by private American companies and foreign entities. Since our overall dependency on critical infrastructure can put us in a vulnerable place relative to cyberwar, it would be advisable for American policy-makers to revise the 2014 NIST Framework and work toward the development of stronger national, international and peace treaties in order to protect the United States from potential future cyberwar.

Exit mobile version