preview

Critical Information Infrastructure Should Be Protected

. INTRODUCTION

The ever evolving technology plays a major role in the global community and that includes the introduction of the cyberspace which is used by a number of role players with different intentions. In the process, cyberspace becomes a playground for criminal activities whereby cyber crimes are committed. The interdependence of nation states that involve the provision of basic services is also affected as technology is used in the provision of those services globally. Technology is therefore regarded as a critical infrastructure in any country. Countries also depend on each other for the provision of technological products such as computers and related devices. The manufacturing and acquisition of technological equipments from other countries do not only provide development opportunities, but also introduce other challenges such as the supply chain risks, vulnerable to threats and cyber attacks by terrorists. Critical Information Infrastructure should therefore be protected (Clemente 2013:6).

Supply chain exists within specific marketplaces that are defined by customer needs, supplier capabilities and regulatory requirements. Supply chain also involves critical infrastructures to make sure that the integrity of products being procured, produced and distributed is maintained. Supply chain security is defined in terms of assured storage and delivery of physical and digital goods and services (Cyber threats to national security 2010). In addition, Roy & Kundu (2012) define security in supply chain as the application of policies, procedures and technology to protect supply chain assets from theft, damage, terrorism and prevent the introduction of unauthorized contraband, people or weapons of mass destruction into supply ch...

... middle of paper ...

...products.

A number of security and supply chain risks exist, especially when technologies are acquired from other countries and companies abroad. Adversaries also target technological products for the purpose of applying attacks to organizations, employees are used in those attacks. Using technologies that the organization does not have control over also pose a risk to the organization. Mitigating factors should always be put in place when outsourcing services to vendors and service providers to manage the risks.

A number of security and supply chain risks were identified and those must be managed properly to make sure that organizations are not vulnerable to attacks. As part of presenting relevant cases that involve the protection of critical information infrastructure, the discussion focus on countries such as the United States, the United Kingdom and China.

More about Critical Information Infrastructure Should Be Protected

Get Access