CKIRR continuation

CRITICAL INFRASTRUCTURE AND KEY RESOURCES 7









Critical Infrastructure and Key Resources (CIKR)

Aravind Reddy Gaddam

Wilmington University













In the contemporary society, there has been an increasing need to preserve critical infrastructure and key resources. The federal government agencies have been at the forefront of advocating for the adoption and protection of critical infrastructure and key resources (Feldman & Florida, 2004). Key resources such as energy sources play an important role in the community since they create a sustainable environment. This paper examines the critical infrastructure and key resources in the community.

Major critical infrastructure and key resources in the community

a) Information Technology Infrastructure (IT)

The presence of information Technology plays a significant role in the community. The adoption of advanced communication technologies has revolutionized the dissemination of information in the contemporary society. One of the crucial factors that have led to tremendous growth and development in the economy is the implementation of effective information technology infrastructure. All sectors of the economy depend on the communication. The IT infrastructure that has been adopted in the community includes the Internet, cell phones, television communication, radio communication as well as social networking sites.

b) Energy

According to Kling (1993), energy is another critical infrastructure that exists in the community. The presence of energy sources has a great impact on the economy of the country. This is because; various sectors of the economy such as the manufacturing sector depend on energy. Energy sources such solar energy; carbon fuels, geothermal power, and electricity are used to provide power that runs the operations of the industries. Moreover, communication technologies also use energy to provide power that ensures effective performance. Energy is a critical resource that has brought a significant impact on the operations in both private and public sector. However, there has been an increasing need to use clean energy to conserve the environment. Energy sources such as carbon fuels cause environmental pollution.

c) Agricultural resources

Another transformational key resource is agriculture. Through agricultural activities, the community can acquire food that sustains life. Agriculture plays a great impact on the economy since it acts as the source of food as well as raw materials for several industries in the society. In the community, both subsistence and commercial agricultural activities are practiced. Large-scale production of crops such as cotton has boosted the growth of textile industries. This is because the crop is used in the industries to manufacture clothes. Moreover, the agricultural activities lead to the creation of employment opportunities to the people living in the society.

Information Technology infrastructure private and public partnership structure

IT infrastructure plays an important role in the modern society. Measures have been adopted that have led to the integration of IT into both private and public partnership structure (Brown et, al, 2006). Information technology resources have been integrated into the private structure through the adoption of communication technologies such as personal computers, and cell phones. These technologies are being used privately in people’s homes to facilitate communication. Private companies also use advanced communication technologies such as teleconferencing to achieve communication in the global market. In the public structure, the federal government has adopted communication strategies that aim to improve the operations of the public officers in various states.

Sector specific agency

The sector-specific agency that is mandated with providing institutional knowledge for the Information Technology infrastructure is the department of security. The department of security is required to ensure effective implementation of various critical infrastructure and key resources. Moreover, the federal agency is expected to ensure the protection of the key resources and critical infrastructure in the country. The department of security is entitled with the creation of awareness on the importance of the key resources and the need to protect them for the betterment of the society.

Threats and vulnerabilities of Information Technology Infrastructure

The human-made threats that pose a great risk to the effective operations of IT infrastructure are cyber-attacks. Since the information technology operates through the Internet, hackers can access the confidential information of business organizations hence hindering effective operations (Duncan, 1995). However, natural threats that can hinder the performance of the critical resource include earthquakes, hurricanes, and tornados. These natural hazards can destroy the critical infrastructure and key resources.

Measures to combat the threats

Human-made threats such as cyber-attack can be controlled through the adoption of advanced security measures. Business organizations can adopt modern security measures such as the use of encrypted data and codes that are difficult to bypass. On the other hand, natural calamities can be managed through adopting alert systems that can be used to prepare for any natural disaster. The community can also embrace effective measures such as reinforcing the communication technologies so as to prevent damage in case of natural calamities.

Evaluation of the effectiveness of the countermeasures

The evaluation process should be undertaken through a periodic assessment of how the countermeasures are performing. For example, in case of a cyber-attack, the adoption of enhanced security measures should protect the company’s data from the hackers. If it has been noted that further cyber-attacks have been prevented, then the measure can be judged as effective. Moreover, the feedback from the members of the society can also be used to evaluate the effectiveness of the countermeasures.

Sharing of information

Information will be shared through awareness creation among all stakeholders. Creation of awareness will help in the management of the threats as well as in evaluating the effectiveness of the countermeasures. The community as well as the nation, in general, will have to use a proper channel of communication to ensure that the threats are managed effectively.

In summary, critical infrastructure and key resources have brought a significant impact on the contemporary society. The federal government agencies should ensure that effective strategies are employed to safeguard the key resources and infrastructure so as to ensure the creation of a sustainable environment in the society.

References

Brown, G., Carlyle, M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces,. Journal of Technology. 36(6), 530-544.

Duncan, N. B. (1995). Capturing flexibility of information technology infrastructure: A study of resource characteristics and their measure. Journal of management information systems, 12(2), 37-57.

Feldman, M. P., & Florida, R. (2004). The geographic sources of innovation: technological infrastructure and product innovation in the United States. Annals of the association of American Geographers, 84(2), 210-229.

Kling, R. (1993). Behind the terminal: The critical role of computing infrastructure in effective information systems' development and use. Center for Research on Information Technology and Organizations.