Tuesday, September 10, 2019
Should base level funding for critical infrastructure protection Research Paper
Should base level funding for critical infrastructure protection against foreign terrorists organizations include domestic (internal) threats - Research Paper Example ously increased their capacities in terms of sophistication and potential damage, there is need to take necessary steps to guard key infrastructures both private- and publicly owned against these developments. In order to effectively tackle cases of terroristic attacks against CI, base level funding for protection against foreign terrorist organizations should include domestic or internal threats. Indeed in todayââ¬â¢s modern world, without critical infrastructure a society cannot function optimally. In fact, it is only in times of peace and relative security that critical infrastructures are characteristically, for granted taken. It must however be appreciated that when one critical infrastructure is annihilated, the entire nation somehow feels the effects of the loss (ITAC, 2006). In some cases, the loss may be as great in magnitude as to affect one or more countries significantly. Owing to their significance, critical infrastructures are always naturally become vulnerable targets for terrorists ââ¬â foreign or those that exist within the nationââ¬â¢s borders (ITAC, 2006). It is in appreciation of this fact that the government in conjunction with its citizens and other stakeholders must always ensure that these infrastructures remain secure and function properly. In the US, currently, there is no clear policy as to how base level funding should be used. This therefore means that in cases of need, funding meant for foreign terrorist protection could be used to solve issues related to domestic threats. While terrorist gangs have often resorted to using bombs and other violent methods, it must be appreciated that they are likely to change tactics soon or later. Instead of engaging in physical combat, terrorists may opt to target information systems and other cyber assets in an unprecedented way. This could of course have a devastating effect since most of the countryââ¬â¢s critical infrastructure is run or controlled by computers which in most cases are networked (ITAC,
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.