Critical Infrastructure Protection: DHS Needs to Better Address Its Cybersecurity Responsibilities


Book Description

Recent cyber attacks demonstrate the potentially devastating impact these pose to our nation¿s computer systems and to the fed. operations and critical infrastructures that they support. They also highlight that we need to be vigilant against individuals and groups with malicious intent, such as criminals, terrorists, and nation-states perpetuating these attacks. The Dept. of Homeland Security (DHS) is the focal point for coordinating cybersecurity, including responsibility for protecting systems that support critical infrastructures, a practice commonly referred to as cyber critical infrastructure protection. This report summarizes key reports and associated recommendations aimed at securing our nation¿s cyber critical infrastructure.




Critical Infrastructure Protection


Book Description

The U.S. Government Accountability Office (GAO) is an independent agency that works for Congress. The GAO watches over Congress, and investigates how the federal government spends taxpayers dollars. The Comptroller General of the United States is the leader of the GAO, and is appointed to a 15-year term by the U.S. President. The GAO wants to support Congress, while at the same time doing right by the citizens of the United States. They audit, investigate, perform analyses, issue legal decisions and report anything that the government is doing. This is one of their reports.




Critical Infrastructure Protection


Book Description

Critical Infrastructure Protection: DHS Needs to Better Address Its Cybersecurity Responsibilities







Critical Infrastructure Protection


Book Description

The Dept. of Homeland Security (DHS) is the focal point for the security of cyberspace. DHS is required to coordinate cyber attack exercises to strengthen public and private incident response capabilities. One major exercise program, called Cyber Storm, is a large-scale simulation of multiple concurrent cyber attacks involving the fed. gov¿t., states, foreign gov¿ts., and private industry. DHS has conducted Cyber Storm exercises in 2006 and 2008. This report: (1) identifies the lessons that DHS learned from the first Cyber Storm exercise; (2) assesses DHS¿s efforts to address the lessons learned from this exercise; and (3) identifies key participants¿ views of their experiences during the second Cyber Storm exercise. Includes recommendations. Illus.




Critical Infrastructure Protection


Book Description




Critical Infrastructure


Book Description

The Dept. of Homeland Security (DHS) is responsible for coordinating a national protection strategy including formation of government & private sector councils as a collaborating tool. The councils, among other things, are to identify their most critical assets, assess the risks they face, & identify protective measures, in sector-specific plans that comply with DHS¿s National Infrastructure Protection Plan. This testimony addresses: (1) the extent to which these councils have been established; (2) key facilitating factors & challenges affecting the formation of the council; (3) key facilitating factors & challenges encountered in developing sector plans; & (4) the status of DHS¿s efforts to fulfill key cybersecurity responsibilities. Charts & tables.




Critical Infrastructure Protection


Book Description




Maritime Critical Infrastructure Protection


Book Description

U.S. maritime ports handle more than $1.3 trillion in cargo annually. The operations of these ports are supported by information and communication systems, which are susceptible to cyber-related threats. Failures in these systems could degrade or interrupt operations at ports, including the flow of commerce. Federal agencies -- in particular the Department of Homeland Security (DHS) -- and industry stakeholders have specific roles in protecting maritime facilities and ports from physical and cyber threats. The objective of this report was to identify the extent to which DHS and other stakeholders have taken steps to address cybersecurity in the maritime port environment. Figures. This is a print on demand report.




Critical Infrastructure Protection


Book Description