Notice: Undefined offset: 0 in /home/rmhu6fn7r820/public_html/wp-content/themes/opskill-123help/functions.php on line 75
Notice: Trying to get property 'status' of non-object in /home/rmhu6fn7r820/public_html/wp-content/themes/opskill-123help/functions.php on line 75
Essay > Words: 667 > Rating: Excellent > Buy full access at $1
The risk management and prevention strategy of the National Infrastructure Protection Plan (NIPP) is framed around six main steps. These sequential steps are: setting goals and objectives, identifying systems, networks and assets, assessing risks (the consequences, vulnerabilities and threats), prioritizing, implementing programs, and measuring effectiveness. At each stage, feedback is expected. These steps occur across three components that make up systems, assets and networks: the cyber, physical and human elements. At each stage, the NIPP, through various branches and subdivisions within the organization, effectively works to ensure that all possible risks are eliminated. In order to effectively manage and eliminate risks, it is imperative that the organization fully understands the risks faced. It is important to understand the possible outcomes of each scenario. Effective risk assessment makes it possible for the organization to anticipate the consequences of any risk that may be faced in future. Risk assessment is therefore the most important step in this framework and should bear more weight than the other steps.
Such governmental guidelines as PPD–21, the Presidential Policy Directive on Critical Infrastructure Security and Resilience, are aimed at raising the level of security, risk assessment and prevention. These directives will set higher standards for the emerging NIPP which will be expected to deliver better services that will in effect stimulate the security improvement. It could lead to changes in the framework currently in use. The PPD-21 recommends the security information to be shared between the various agencies involved in security matters. Although this may be beneficial as well as convenient, it could lead to leakage of sensitive information. Sensitive information may end up in the wrong hands if too many people have access to it. This could be counterproductive.
Over the years, cyber threats have become increasingly common. There has been an increase in security attacks on IT and information resources. Research shows that 60% of organiza.............
Type: Essay || Words: 667 Rating || ExcellentSubscribe at $1 to view the full document.
Buy access at $1