How Technology is Controlling Our Infrastructure, Civilians and Military Working Together to Minimize Cyberattacks

Date of Publication

2019 12:00 AM

Security Theme

Critical Infrastructure

Keywords

Critical Infrastructure, technological development, risks, criticalinfrastructure, cyberattacks, civilian and military partnerships

Description

The purpose of this document is to analyze the influence of technological development and how that development increases the risks in our critical infrastructure. When we study our state, we look around and see how technology is taking control of all our important and critical systems. So, It is necessary to find the way of minimizing the cyberattacks through all the possible ways that our state has, such as, the military cyber units, legislation, protocols of act, and the most important part: the civilians that work in private companies (banks, hospitals, the electricity company, and others). This work should do this with two main objectives: first, working together as one indivisible partnership against those threats, and second, trying to maintain the systems that form our critical infrastructure safe and secure. To develop this topic, we will use the descriptive method, and collect the information from important works, such as, The National Cyber Security Strategy Policy (Guatemala, Mingob 2018), books about terrorism or cyber terrorism and some web sites that describe diagnosis of cyber-attacks and how those cyber units have protected their critical infrastructure.

Share

 
COinS
 
Jan 1st, 12:00 AM

How Technology is Controlling Our Infrastructure, Civilians and Military Working Together to Minimize Cyberattacks

The purpose of this document is to analyze the influence of technological development and how that development increases the risks in our critical infrastructure. When we study our state, we look around and see how technology is taking control of all our important and critical systems. So, It is necessary to find the way of minimizing the cyberattacks through all the possible ways that our state has, such as, the military cyber units, legislation, protocols of act, and the most important part: the civilians that work in private companies (banks, hospitals, the electricity company, and others). This work should do this with two main objectives: first, working together as one indivisible partnership against those threats, and second, trying to maintain the systems that form our critical infrastructure safe and secure. To develop this topic, we will use the descriptive method, and collect the information from important works, such as, The National Cyber Security Strategy Policy (Guatemala, Mingob 2018), books about terrorism or cyber terrorism and some web sites that describe diagnosis of cyber-attacks and how those cyber units have protected their critical infrastructure.