UniversityEssayServices

Discuss the unique characteristics and risk landscape of the Communications and Information Technology sectors.  How should the public and private sectors be coordinated to assist in securing these sectors?

The Communications Sector is vital to the United States economy, government, public safety, and business efficiency and success. What was once a voice service provider, this sector has grown into vast and interconnected systems that are wireless, satellite, and terrestrial in nature (DHS, 2017a). The systems are highly dependent on each other, in addition to the sector’s effect as a whole on other critical infrastructures. There are a vast amount of risks to the Communications Sector, including weather events (wildfires, hurricanes, and even geomagnetic solar super storms), the supply chain, political and economic unrest, and cyber threats. Aging infrastructure, climate change, and pandemic diseases are also threats to communications systems (DHS, 2015). Since much of the communications systems are owned and operated privately, it is vital that coordination and tactics be in place to prepare for, mitigate, and resolve attacks and incidents. According to the DHS, the NIPP Partnership Model involves both public and private sectors in collaboration initiatives. Councils meet to share ideas, facilitate resource allocation, put plans in place, and develop security and resilience programs (2015).

The Information Technology Sector is of great concern in assessing risk due to its significant influence and dynamic nature. Technology as a whole is rapidly advancing, making it difficult for the United States government to stay ahead of cyber threats and attacks. According to the DHS, America’s public safety, security, academia, and citizens are heavily reliant on the Technology Sector’s functions. However, because of the complex environment of the sector, the identification of threats and assessment of vulnerabilities is challenges and must be approached through collaboration and innovation (2017b). Examples of risks in the Information Technology Sector include the production of an untrustworthy critical product through an attack on supply chain, a significant Denial-of-Service attack on DNS infrastructure, a manmade unintentional accident causing large loss of e-Commerce capabilities. In order to establish coordination between the public and private sectors, the Information Technology Sector encourages collaboration and communication on policies, security initiatives, and strategies for IT Sector success. The priorities of the sector include the strengthening of the partnership domestically and internationally to advance situation awareness, information sharing, incident management, and strategic policies (DHS, 2016). The IT Sector definitely presents many benefits to our nation, as well as growing threats in the need of constant mitigation.

References:

Department of Homeland Security. (2017a). Communications Sector. Retrieved from https://www.dhs.gov/communications-sector

Department of Homeland Security. (2015). Communication Sector-Specific Plan. Retrieved from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-communications-2015-508.pdf

Department of Homeland Security. (2017b). Information Technology Sector. Retrieved from https://www.dhs.gov/information-technology-sector

Department of Homeland Security. (2016). Information Technology Sector-Specific Plan. Retrieved from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-information-technology-2016-508.pdf

Corey Neal

Discuss the unique characteristics and risk landscape of the Communications and Information Technology sectors.

Dating back to the civil war, Morse Code was an integral part of communication between allies discussing troop movement and other vital information regarding operations. Once this was well established, intelligence professionals were tasked with intercepting these messages, exploiting the vulnerabilities of communication and technology. Fast forward a couple of wars later and communication interception still proves to be a vital means of intelligence. This proves the vulnerabilities that come along with the Communication and Information Technology sectors. Since then “the sector has evolved from predominantly a provider of voice services into a diverse, competitive, and interconnected industry using terrestrial, satellite, and wireless transmission systems” (DHS, 2017a). Both sectors play an integral role in not only the personal lives of millions of Americans, but also the function of international business relations and growth. It is the goal of both sectors to work together to safeguard information and discover threats before a national security issue occurs.

How should the public and private sectors be coordinated to assist in securing these sectors?

There are numerous agencies that are tasked with protecting both the Communication and Information Technology sectors. Aside from federal government entities, private contractors are also expected to assist in ensuring the continuous monitoring of vulnerabilities. With the emergence of cyber security, the National Security Agency and Department of Defense have both taken proactive measures in supplying certified personnel and systems that are capable of preventing attacks via the internet and computers. The Information Technology sector is tasked to “produce and provide hardware, software, and information technology systems and services, and—in collaboration with the Communications Sector—the Internet” (DHS, 2017b). With the constant progress of the internet and technology, comes new ways to exploit individuals and governments. The U.S. is a great example of how we not only focus on defending our systems, but also we provide the means to be offensive and try probing other organization’s systems. Without the private and public sector working together, information technology and communications sector would be vulnerable to attacks.

References:

Department of Homeland Security. (2017a). Communications Sector. Retrieved from https://www.dhs.gov/communications-sector

Department of Homeland Security. (2017b). Information Technology Sector. Retrieved from https://www.dhs.gov/information-technology-sector

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Sales Offer

Coupon Code: SAVE25 to claim 25% special special discount
SAVE