I believe our most vulnerable critical infrastructure is in information technology and cybersecurity. With the advancement and significance of information technology comes an array of threats to the cyber and physical infrastructure operations. These attacks can affect things such as our economy or elections. In 2018, President Trump established the Cybersecurity and Infrastructure Security Agency (CISA). CISA “coordinates security and resilience efforts using trusted partnerships across the private and public sectors, and delivers technical assistance and assessments to federal stakeholders as well as to infrastructure owners and operators nationwide” (DHS, 2019). CISA plays a specific role in cybersecurity which I find to be a very vulnerable critical infrastructure because, “Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services” (CISA, 2020). Some of our biggest cybersecurity threats according to CISA are from China, Russia and North Korea. Structural mitigation is in place with CISA in the form of information sharing, tips and alerts, securing federal networks, protecting critical infrastructure, and directives and guidance. Non-structural mitigation may require a virtual evacuation of sorts, where information is removed to prevent further loss during a cyberattack.
With the advancement in technologies are borders have become more secure. Nemeth (2016) stated “CBP continually adds sophisticated equipment and technology to carry out its mission. The use of drones and other unmanned air devices is now part and parcel of the delivery system” (p. 393). Furthermore, our text goes on to discuss the use of scans on vessels tracking their journey and additional radiation and x-ray inspections. The use of new and emerging technology has helped to secure our borders more than ever. I do believe it is important for us to secure our borders. DHS (2019) stated “Protecting our borders from the illegal movement of weapons, drugs, contraband, and people, while promoting lawful entry and exit, is essential to homeland security, economic prosperity, and national sovereignty.” The protection of our border includes protection from terrorists attacks and of weapons entering our homeland. To better secure our borders I would continue to invest in new technology that can advance techniques used at the border. Another option may be to work on the relationship with bordering countries in reference to punishments for crossing illegally with weapons or drugs. Without some type of deterrence there is nothing stopping people from trying to take advantage of the border committing crime and not being punished for it.
Proverbs 1:33 (ESV) states “But whoever listens to me will dwell secure and will be at ease, without dread of disaster.” If we trust in the Lord we can create security within ourselves and not fear disaster. We can work to do the same when it comes to border security and our securing our homeland.
References
Cybersecurity and Infrastructure Security Agency. (2020). Cybersecurity. https://www.cisa.gov/cybersecurity
Department of Homeland Security. (2019). Critical Infrastructure Security. https://www.dhs.gov/topic/critical-infrastructure-security
Department of Homeland Security. (2019). Border Security Overview. https://www.dhs.gov/border-security-overview
Nemeth, C. P. (2016). Homeland security: An introduction to principles and practices 3rd ed. Boca Raton, FL: Taylor & Francis (CRC Press).
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreThe Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.
Read moreThe Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.
Read moreThe Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.
Read moreBy placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
Read more