ORDER NOW
ESSAY WRITING SERVICE SAMPLE: CYBER SECURITY RESPONSES
Posted by: Write My Essay on: July 17, 2018

Sample by My Essay Writer

Student 1

I agree with the determination of the need for increased protection of the banking, defense, and critical infrastructure from cyber-attacks. Manuel Suter’s, A Generic National Framework for Critical Information Infrastructure Protection (CIIP) succinctly addresses the measures that should be engaged to protect critical infrastructure from cyber-attacks. The four pillars of CIIP provide the most appropriate practices in the mitigation of the cyber-attacks. This is because it allows for the establishment of an effective CIIP model which will serve the purposes of pre-empting, identifying and curtailing the impacts of cyber-attacks on critical infrastructure.  [“Write my essay for me?” Get help here.]

It is true that through preventive measures, such as workshops and advisories, the cyber security initiatives of different organizations will be augmented. Preventive measures further entail the sharing of information between different companies, which eases the processes of cybersecurity among the subject companies. Information sharing allows for convergence of the CIIP units which indeed makes the preventive measures more efficient and organized. Detection provides the next framework in critical information infrastructure protection (CIIP). I agree with the assertions that indicate that the impacts of a cyber threat can be curtailed significantly if they are identified early. Early identification of the cyber threats is enhanced through the sharing of information given the changing nature of cyber-attacks. [Need an essay writing service? Find help here.]

Reaction comprises the third step in CIIP. However, I counter the assertions to reaction entailing the identification of the threat. On the contrary, reaction entails the responses that are instituted after the identification of the threat. Regardless, it is true that reaction can be enhanced when companies share information. Crisis management in CIIP entails the notification of the respective parties which greatly enhances the efficiencies of the instituted responses to a cyber threat. Nonetheless, it is true that the successes of these initiatives depend on the policies which are put in place in the subject organizations. To enhance the efficiencies of the CIIP strategies, there is a need to increase the funding that is extended towards these initiatives (Cuomo & Lawsky, 2014).

Student 2

Indeed, Manuel Suter (2007) determines four pillars of Critical Information Infrastructure Protection (CIIP). They include prevention and early warning, detection, reaction and crisis management. The CIIP units are intended to mitigate the impacts of the cyber threat to critical infrastructure. However, it is true that the successes of the pillars are determined by the owning organization and the policies they engage to accommodate the units. Indeed, many smaller countries find it hard to mitigate such threats because they lack the CIIP components which would greatly enhance their mitigation efforts. Developed countries, however, given the presence of critical infrastructure, have to adopt mechanisms through which they can curtail the impacts of cyber-attacks. [Click Essay Writer to order your essay]

Nonetheless, the paper does not succinctly address the pillars. It does not provide an in-depth analysis of the units in seclusion. This does not address the disparities between the units and how the units can be used to further the cyber security initiatives of the different organization. The paper further lacks a defined path of thought processes that would have served to create a link between the banking, defense, and critical infrastructure cyber security initiatives. The employ of bank card chips is not reflective of the need to protect banking institutions against cyber attacks. Cyber attacks are instituted over the internet and are often intended to secure information. In other cases, cyber-attacks are instituted to curtail the transmission of information which would have been captured succinctly with the examination of the pillars addressed in the CIIP framework. Comparisons of the Sutter (2007) and Parks (2007) principles does not succinctly respond to the prevailing question on ways through which the occurrences of cyber-attacks on critical infrastructure can be addressed.

References 
Sutter, Michael. (2007) A Generic National Framework for Critical Information
Infrastructure Protection (CIIP)
.

Cuomo, Andrew, and Lawsky, Benjamin (2014) New York State Department of Financial Services: A Report on Cyber Security in the Banking Sector.

Leave a Reply

Your email address will not be published. Required fields are marked *