An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks
Book Details
Author(s)Dr. R. LeWayne Johnson
ISBN / ASINB008ZQ3V3E
ISBN-13978B008ZQ3V36
Sales Rank1,748,974
MarketplaceUnited States 🇺🇸
Description
ABSTRACT
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country’s IT infrastructure. Critics contend that the DHS has failed to address planning and policy concerns related to the protection of this infrastructure from cyber-terrorism. The focus of this book is to present a dissertation study that identified network vulnerabilities that may be exploited by cyber-terrorists and offer policy recommendations to alleviate this problem.
The study explored factors preventing DHS from properly planning for critical network protection and investigated whether private sector models can be used to alleviate factors that inhibit network security in terms of efficiency and network performance.
Bertalanffy’s systems thinking model provided the theoretical foundation for this study. Additionally, Royce’s waterfall model and system engineering models from production flow theory were used to supplement Bertalanffy’s work and adapt it to an IT environment.
The study used a mixed model research design that combined content analysis and Q methodology with descriptive statistics. The Q methodology and descriptive statistics approach included a 17 statement survey sample about IT networks. The study documented that IT professionals perceive that DHS’s current approach to assessing risks to U.S. IT infrastructure and designing policies to mitigate those risks as inadequate.
IT professionals prefer a more systematic approach to IT infrastructure protection planning and policy. The results of this study provide a means to impact positive social change by offering the framework for a model to perform early assessments of cyber-terrorism threats to our critical infrastructure network systems and mitigate those threats.
Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country’s IT infrastructure. Critics contend that the DHS has failed to address planning and policy concerns related to the protection of this infrastructure from cyber-terrorism. The focus of this book is to present a dissertation study that identified network vulnerabilities that may be exploited by cyber-terrorists and offer policy recommendations to alleviate this problem.
The study explored factors preventing DHS from properly planning for critical network protection and investigated whether private sector models can be used to alleviate factors that inhibit network security in terms of efficiency and network performance.
Bertalanffy’s systems thinking model provided the theoretical foundation for this study. Additionally, Royce’s waterfall model and system engineering models from production flow theory were used to supplement Bertalanffy’s work and adapt it to an IT environment.
The study used a mixed model research design that combined content analysis and Q methodology with descriptive statistics. The Q methodology and descriptive statistics approach included a 17 statement survey sample about IT networks. The study documented that IT professionals perceive that DHS’s current approach to assessing risks to U.S. IT infrastructure and designing policies to mitigate those risks as inadequate.
IT professionals prefer a more systematic approach to IT infrastructure protection planning and policy. The results of this study provide a means to impact positive social change by offering the framework for a model to perform early assessments of cyber-terrorism threats to our critical infrastructure network systems and mitigate those threats.
