There are several key areas where laws, regulations, and directives have been enacted requiring industries to preserve their assets for the protection of their investors, benefactors, or place in the National Critical Infrastructure. In May 1998, the President of the United States through PDD 63 required that specific measures were taken to protect the National Critical Infrastructure:
The President's policy … [s]ets a goal of a reliable, interconnected, and secure information system infrastructure by the year 2003, and significantly increase[s] security to government systems by the year 2000, by … [i]mmediately establishing a national center to warn of and respond to attacks. Ensuring the capability to protect critical infrastructures from intentional acts by 2003, PDD 63 addresses the cyber and physical infrastructure vulnerabilities of the Federal government by requiring each department and agency to work to reduce its exposure to new threats. It requires the Federal government to serve as a model to the rest of the country for how infrastructure protection is to be attained. It seeks the voluntary participation of private industry to meet common goals for protecting our critical systems through public-private partnerships. It protects privacy rights and seeks to utilize market forces. It is meant to strengthen and protect the nation's economic power, not to stifle it. Seeks full participation and input from the Congress.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
Nessus is a popular open-source scanner for organizations that choose not to spend the money on other proprietary products. There are s...
-
The IMP should be designed to follow some simple principles in order to be most effective. The plan should reflect the nature of the bus...
-
Often crisis responders will initiate a crisis notification through a verbal briefing. As such, it is imperative that a clear and accurate ...
-
The composition of the crisis and incident response teams should reflect the personnel required to analyze and deal with any events, fro...
-
The company should either establish a permanent facility in which to manage crisis events (if the frequency and scope of crises facing its ...
-
The inability to effectively gather and share information is a frequent management failure during many crisis events both within the incide...
-
Typically, the vulnerability information used by a particular vendor of a VM scanner or analyzer is stored in a database that is des...
-
Definition of hazard • A characteristic or group Of characteristics that provides the potential for a loss. • Examples: Internal and e...
-
The first step in implementing a strategy for deploying physical scanners is to select a central location to which all scanners will re...
-
In many descriptions you will see the words "Critical Incident Response Team" associated with critical incidents. Many incident ...
0 comments:
Post a Comment