Executive Order Critical Infrastructure Protection in the Information Age. Signed: October 16, ; Federal Register page and date: 66 FR Executive Order of November 9, (“Presidential Task Force on Executive Order of October 16, (“Critical Infrastructure. Title. E.O Document. E.O Description. Critical Infrastructure Protection in the Information Age. Last Modified. Oct 18,
|Published (Last):||11 December 2008|
|PDF File Size:||17.38 Mb|
|ePub File Size:||1.35 Mb|
|Price:||Free* [*Free Regsitration Required]|
This Executive Order provides specific policy direction to ensure the protection of information systems so critical infrastructureincluding emergency preparedness communications, and the physical assets that support such systems.
Retrieved December 31, from Encyclopedia. Protection of these systems is essential to the telecommunications, energy, financial services, manufacturing, water, transportation, health care, and emergency services sectors.
The Executive Order tasked the board with recommending policies and coordinating programs for protecting critical infrastructure protection CIP -related information systems. The information age has made it extremely difficult, or even impossible, to create any physical barriers between the government and the outside world.
Executive Order ; EO Author: Crime, Terrorism and Warfare in the Information Age. In the wake of Septemberthe government of the United States was forced to reconsider all possible threats that could be posed to the nation.
Executive Order 13231
Print this article Print all entries for this topic Cite this article. Home Politics Energy government and defense magazines Executive Order The Special Advisor reported to the Assistant to the President for National Security Affairs and to the Assistant to the President for Homeland Security and coordinated with the Assistant to the President for Economic Policy on issues relating to private-sector systems and economic effects and with the Director of OMB on issues relating to budgets 133231 the security of federal computer systems.
Responding to this new reality required a coordinated response by the government and on October 16,President Bush issued Executive Order to protect the United States in the modern age of communications and technological reliance. This Executive Order specifically calls for the implementation of the policy to include “a voluntary public-private partnership, involving corporate and nongovernmental organizations.
Attacks launched over communications wires and computer networks can become manifest in numerous forms and with a large array of possible outcomes. Executive Orders are directives issued by the President of the United States. Office of the Federal Register Date: In presenting this order, the government recognizes that terrorists are committed to discovering new ways of attacking their enemies, and recognizes that terrorist organizations have dedicated themselves towards enhancing their ability to 1331 down the information infrastructure of the United States.
George Walker Modern Language Association http: Ball, Kirstie and Webster, Frank. The Executive Order established ten standing committees to support the board’s work on a wide range of critical information.
Executive Order Critical Infrastructure Protection in the Information Age
In addition to the countless benefits that information technology has offered, it has presented terrorists with the ability to wage oe battles a world away from the site they plan to attack. Whereas in the past, secret documents were locked behind sealed and guarded doors, 113231 nature of today’s reliance on technology means that with enough motivation and the proper knowledge, criminals and terrorists can sometimes gain access to information at the highest levels of government and the defense community.
By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to ensure protection of information systems for critical infrastructure, 13321 emergency preparedness communications, and the physical assets that support such systems, in the information age, it is hereby ordered as follows:.
With the world’s increasing reliance on so in all aspects of daily life, the threat posed by terrorists to use technology to interrupt the flow of information around the globe has grown more serious.
The Executive Order emphasized the importance of CIP and the information sharing and analysis centers ISACsbut did not identify any additional requirements for agencies to protect their critical infrastructures or suggested additional activities for the ISACs. The Secretary of Defense and the Director of Central Intelligence DCI shall have responsibility to oversee, develop, and ensure implementation of policies, principles, standards, and guidelines for the security of information systems that support the operations under their respective control.
Coordinate programs and policies for responding to information systems security incidents that threaten information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems. Then, fo and paste the text into 31231 bibliography or works cited list.
While this order by no means introduced the notion of the vulnerability of the nation’s infrastructure in light of its reliance on technology, it used wo attacks as a reason to strengthen defenses already in place.
According to EOthe board’s responsibilities were to recommend policies and coordinate programs for protecting information systems for critical infrastructuresincluding emergency preparedness communications and the physical assets that support such systems. Learn more about citation styles Citation styles Encyclopedia.
Promote programs against cyber crime and assist Federal law enforcement agencies in gaining necessary cooperation from executive branch departments and agencies.
Executive Order – Wikidata
Sign In Don’t have an account? The Office of Homeland Security. Retrieved from ” http: In consultation with the Assistant to the President for National Security Affairs and the affected departments and agencies, the Secretary of Defense and the DCI shall develop policies, principles, standards, and guidelines for the security of national security information systems that support the operations of other executive branch departments and agencies with national security information.
Work with industry, State and local governments, and nongovernmental organizations to ensure that systems are created and well managed to share threat warning, analysis, and recovery information among government network operation centers, information sharing and 13321 centers established on a ro basis by industry, and other related operations centers.