Executive Order Critical Infrastructure Protection in the Information Age. Signed: October 16, ; Federal Register page and date: 66 FR Executive Order of November 9, (“Presidential Task Force on Executive Order of October 16, (“Critical Infrastructure. Title. E.O Document. E.O Description. Critical Infrastructure Protection in the Information Age. Last Modified. Oct 18,
|Published (Last):||5 June 2004|
|PDF File Size:||11.51 Mb|
|ePub File Size:||13.54 Mb|
|Price:||Free* [*Free Regsitration Required]|
Modern Language Association http: While this order by no means introduced the notion of the vulnerability of the nation’s infrastructure in light of its reliance on technology, it used the attacks as a reason to strengthen defenses already in place.
Ball, Kirstie and Webster, Frank.
There are few aspects of life in Western societies that are not directly connected to the information superhighway, as this flow of information around the globe has become known. The protection program authorized by this order shall consist of continuous efforts to secure information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems.
One famous case of this type of use of the directive occurred during the course of World War II —when President Franklin Roosevelt issued an Executive Order to intern American citizens of Japanese ancestry. Retrieved from ” http: This Executive Order provides specific policy direction to ensure the protection of information systems for critical infrastructureincluding emergency preparedness communications, and the physical assets that support such systems.
The Intensification Of Surveillance: Learn more about citation styles Citation styles Encyclopedia.
Most commonly, information terrorists aim to introduce viruses into computer systems enabling them either to steal critical information or to destabilize public systems. The Special Advisor reported to the Assistant to the President for National Security Affairs and to the Assistant to the President for Homeland Security and coordinated with the Assistant to the President for Economic Policy on issues relating to private-sector systems and economic effects and with the Director of OMB on issues relating to budgets and the security of oe computer systems.
The information age has made it extremely difficult, or even impossible, to create any physical barriers between the government and the outside world.
Executive Order |
The Office of Homeland Security. In presenting this order, the government recognizes that terrorists are committed to discovering new ways of attacking their enemies, and recognizes that terrorist organizations have dedicated themselves towards enhancing their ability to bring e the information infrastructure of the United States.
The Executive Order emphasized the importance of CIP and the information sharing and analysis centers ISACsbut did not identify any additional requirements for agencies to protect their critical infrastructures or suggested additional activities for the ISACs. Public Domain Retrieved From: Heads of such departments and agencies shall ensure the development and, within ep appropriations, funding of programs that adequately address these mission areas.
The Board’s wide ambit includes outreach to the private sector and state and local governments, information sharing, incident coordination and crisis response, recruitment of Executive Branch security professionals, coordination of research and development, law enforcement coordination, and international cooperation. Additionally, security should enable, and not unnecessarily impede, department and agency business operations. Crime, Terrorism and Warfare in the Information Age.
Office of the Federal Register Date: Such attacks include a cyber terrorist being able to shut down an electrical grid for an extended period of time, infiltrate national defense systems, or even destabilize nuclear power plants.
Executive Order 13231
Executive Orders are directives issued by the President of the United States. In consultation with the Assistant to the President for National Security Affairs and the affected departments el agencies, the Secretary of Defense and the DCI shall develop policies, principles, standards, and guidelines for the 12331 of national security information systems that support the operations of other executive branch departments and agencies with national security information.
Print this article Print all entries for this topic Cite this article. Whereas in the past, secret documents were locked behind sealed and guarded doors, the nature of today’s reliance on technology means that with enough motivation and the proper knowledge, criminals and terrorists can sometimes gain access to information at the highest levels of government and the defense community.
Support Federal law 1231 agencies’ investigation of illegal activities involving information systems for critical infrastructure, including emergency preparedness communications, and 133231 physical assets that support such systems, and support coordination by these agencies with other departments and agencies with responsibilities to defend the Nation’s security, the Board shall work in coordination with the Department of Justice, through the NIPC, and the Department of the Treasury, through the Secret Service, and with other departments and agencies, as appropriate.
To achieve this policy, there shall be a senior executive branch board to coordinate and have cognizance of Federal efforts and programs that relate to protection of information systems and involve:. 12331 the Department of State’s coordination of United States Government programs for international cooperation covering international information infrastructure protection issues.
George WalkerPublisher: In consultation with affected executive branch departments and agencies, coordinate outreach to and consultation with the private sector, including corporations that own, operate, develop, and equip information, telecommunications, transportation, energy, water, health care, and financial services, on protection of information systems for critical fo, including emergency preparedness communications, and the physical assets that support such systems; and coordinate outreach to State and local governments, as well as communities and representatives from academia and other relevant elements of society In this function, the Board shall work in coordination with the National Science Foundationthe Defense Advanced Research Projects Agencyand with other departments and agencies, as appropriate.
The board was created to work as a partner with the Office of Homeland Security.
In addition to the countless benefits that information technology has offered, it has presented terrorists with the ability to wage their battles a world away from the site they plan to attack.
The order created a federal “critical infrastructure protection” board and charged it with recommending policies and coordinating programs for protecting information systems for critical infrastructure.