Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Class 3 Week Discussion 1

Class 3: Week Discussion 1

Author’s Name

Institutional Affiliation

Class 3: Week Discussion 1

Galinec, Možnik, and Guberina (2017) suggest that cybersecurity or information technology security is the practice of protecting and guarding data, networks, digital and electronic systems, computers, mobile implements, and servers from malicious digital attacks or cyber-attacks. These attacks are usually instigated to access, change, alter, or destroy sensitive information, gather politically motivated information, extort money from information owners or interrupt regular processes in businesses (Cisco, n.d).

Critical infrastructure refers to the collection of physical and virtual assets, processes, facilities, systems, networks, technologies, and services essential to the security, health, economic wellbeing, and safety for citizens and their governments’ effective functioning (Cybersecurity & Infrastructure Security Agency, 2019; Tiirmaa-Klaar, 2016). The Government of Canada (2019), suggests that critical infrastructure can be interdependent and interconnected across territories, states, and national borders or operate as stand-alone establishments.

Studying cybersecurity as it relates to critical infrastructure is important because it equips one with the knowledge of defending and protecting the sixteen critical infrastructure sectors whose systems, assets, and networks are critical to the nation’s wellbeing, security, and safety. The disruptions, destruction, or incapacitation of these sectors can have devastating impacts on public health and safety, national economic security, and national security, which can culminate in catastrophic loss of life, momentous harm to public confidence, and adverse economic ramifications (Cybersecurity & Infrastructure Security Agency, 2019; Knapp & Langill, 2014; Isle of Man Government, 2018). Also, studying cybersecurity and its associations with critical infrastructure is imperative because it enables one to know the key security operations, protocols, functions, control systems, and applications for protecting the critical infrastructure that includes detecting, investigating, and remediating digital attacks that target critical infrastructure (Knapp & Langill, 2014). Thirdly, studying cybersecurity allows one to comprehend the dynamics of strengthening and maintaining resilient and securely functioning critical infrastructure.

One aspect of computing technology that most concerns me is the concept of virtualization. As virtualization in the contemporary world continues to expand from personal computers to servers, routers, and other technologies, many think that this will provide higher levels of control. However, I am concerned that cyber terrorists will find new ways of leveraging virtualization to create sophisticated virtual tools capable of destroying lives and property in great magnitudes. Another aspect that most concerns me is the growing over-reliance on intelligent machines. This concerns me because sooner or later, people’s social and cognitive abilities will be eroded by the deep dependence on automated machines, hence destroying their capacities for interactions and independent action and thinking.

References

Cisco. (n.d). What is cybersecurity?. San Jose, CA. Cisco. Retrieved January 14, 2020, from https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html#~related-topics.

Cybersecurity & Infrastructure Security Agency. (March 03, 2019). Critical infrastructure sectors. Cybersecurity & Infrastructure Security Agency, U.S. Department of Homeland Security. Retrieved January 14, 2020, from https://www.cisa.gov/critical-infrastructure-sectors.

Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: national level strategic approach. Automation: Journal of Automation, Measurement, Electronics, Computing and Communications, 58(3), 273-286.

Government of Canada. (2019). Critical infrastructure. Government of Canada. Retrieved January 14, 2020, from https://www.publicsafety.gc.ca/cnt/ntnl-scrt/crtcl-nfrstrctr/index-en.aspx.

Isle of Man Government. (2018). National cyber security strategy. Isle of Man Government.

Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, 2 Ed. Syngress.

Tiirmaa-Klaar, H. (2016). Building national cyber resilience and protecting critical information infrastructure. Journal of Cyber Policy, 1(1), 94-106.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.