Font Size: a A A

Critical infrastructure protection

Posted on:2015-11-25Degree:M.SType:Thesis
University:Utica CollegeCandidate:Shwani, Hazim GFull Text:PDF
GTID:2475390020952681Subject:Computer Science
Abstract/Summary:
This research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to protect critical infrastructures was also explored. From the literature review, it was concluded there are security loopholes in critical infrastructures. The study also uncovered that the federal government uses the newest cybersecurity tools, but does not share cyber vulnerabilities and risks with the private sector operating the infrastructures. The study also included an in-depth examination of Congressional documents pertaining to cybersecurity. However, it concluded that implementing rules and regulations is an ardouous step for the US Congress due to conflicts of interest. Finaly, the studied uncovered robust training, information sharing, and a contingency plan as the DHS's strategy to adapt to cyber threats that are emerging. Key Words: Critical Infrastructure, Cybersecurity.
Keywords/Search Tags:Critical, Cybersecurity
Related items