Cybersecurity Write Ups

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

The increasing dependency upon information technology (IT) systems and networked operations pervades nearly every aspect

of our society. In particular, increasing computer interconnectivity most notably growth in the use of the Internethas revolutionized the way that our government, our nation, and much of the world communicate and conduct business. While bringing significant benefits, this dependency can also create vulnerabilities to cyber-based threats. Pervasive and sustained cyber attacks against the United States could have a potentially devastating impact on federal and nonfederal systems and operations. In January 2012, the Director of National Intelligence testified that such threats pose a critical national and economic security concern.1 These growing and evolving threats can potentially affect all segments of our societyindividuals; private businesses; local, state, and federal governments; and other entities. Underscoring the importance of this issue, we have designated federal information security as a high-risk area since 1997 and in 2003 expanded this area to include protecting computerized systems supporting our nations critical infrastructure.2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy