EO 13231 PDF

Executive Order Critical Infrastructure Protection in the Information Age. Signed: October 16, ; Federal Register page and date: 66 FR Executive Order of November 9, (“Presidential Task Force on Executive Order of October 16, (“Critical Infrastructure. Title. E.O Document. E.O Description. Critical Infrastructure Protection in the Information Age. Last Modified. Oct 18,

Author: Kazragor Nalkis
Country: Greece
Language: English (Spanish)
Genre: Video
Published (Last): 26 March 2006
Pages: 296
PDF File Size: 6.75 Mb
ePub File Size: 16.93 Mb
ISBN: 894-2-30295-570-8
Downloads: 65206
Price: Free* [*Free Regsitration Required]
Uploader: Dazil

Office of the Federal Register.

To achieve this policy, there shall be a senior executive branch board to coordinate and have cognizance of Federal efforts and programs that relate to protection of information systems and involve:.

In the wake of Septemberthe government of the United States was forced to reconsider all possible threats that could be posed to the nation. One famous case of this type of use of the directive occurred during the course of World War II —when President Franklin Roosevelt issued an Executive Order to intern American citizens of Japanese ancestry. Executive Orders are directives issued by the President of the United States. The Secretary of Defense and the Director of Central Intelligence DCI shall have responsibility to oversee, develop, and ensure implementation of policies, principles, standards, and guidelines for the security of information systems that support the operations under their respective control.

Executive Order 13231

The order created a eeo “critical infrastructure protection” board and charged it with recommending policies and coordinating programs for protecting information systems for critical infrastructure.

A further danger involves the ease with which terrorists can communicate with one another without being detected. George WalkerPublisher: The Intensification Of Surveillance: The intent of this type of order, which has been in place since the first eoo of George Washington is usually to dictate specific action by officials or agencies working with the President on a specific issue.

Then, copy and paste the text into your bibliography or works cited list. Cost-effective security shall be built into and made an integral part of government information systems, especially those critical systems that support the national security and other essential government programs. The Executive Order emphasized the importance of CIP and the information sharing and analysis centers ISACsbut did not identify any additional requirements for agencies to protect their critical infrastructures or suggested additional activities for the ISACs.

The Assistant to the President for Homeland Security, in coordination with the Assistant to the President for National Security Do, shall be responsible for defining the responsibilities of the Board in coordinating efforts to protect physical assets that support information systems.

Executive Order – Wikidata

October 18, Source: Sign In Don’t have an account? Learn more about citation styles Citation styles Encyclopedia. Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.

Related Posts (10)  AGE OF PROPAGANDA PRATKANIS PDF

This Executive Order provides specific policy direction to ensure the protection of ei systems for critical infrastructureincluding emergency preparedness communications, and the physical assets that support such systems. Ball, Kirstie and Webster, Frank. Heads of such departments and agencies shall ensure the development and, within available appropriations, funding of programs that adequately address these mission areas.

Print this article Print all entries for this topic Cite this article. The information age has made it extremely difficult, or even impossible, to 132311 any physical barriers between the government and the 1331 world.

The implementation of this policy shall include a voluntary public-private partnership, involving corporate and nongovernmental organizations. The Executive Order established ten standing committees to support the board’s work on a wide range of critical information. Support Federal law enforcement agencies’ investigation of illegal activities involving information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems, and support coordination by these agencies with other departments and agencies with responsibilities to defend the Nation’s security, the Board shall work in coordination with the Department of Justice, through the NIPC, and the Department of the Treasury, through the Secret Service, and with other departments and agencies, as appropriate.

This executive order outlines the commitment of the government in exposing the potential for further harm to be exacted against the United States.

It formally establishes as U.

Among its activities to implement these responsibilities, the Board shall:. Responding to this new reality required a coordinated response el the government and on October 16,Eoo Bush issued Executive Order to protect the United States in the modern age of communications and technological reliance. Public Domain Retrieved From: The protection program authorized by this order shall consist of continuous efforts to secure information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems.

Critical Infrastructure Protection in the Information Age The order created a federal “critical infrastructure protection” board and charged it with recommending policies and coordinating programs for protecting information systems for critical infrastructure.

The three tenets that help populations operate safely; free traffic of el and commerce, a strong government, and a national defense, could e be potentially crippled if the technological infrastructure supporting those institutions was compromised. Modern Language Association http: While this order by no means introduced the notion of the vulnerability of the nation’s infrastructure in light of its reliance on technology, it used the attacks as a reason to strengthen defenses already in place.

Executive Order Critical Infrastructure Protection in the Information Age

The primary action taken in light of this order was the creation of the President’s Critical Infrastructure Protection Board, whose job it is to offer the recommendations for policies to protect the nation’s critical systems from attack, and to provide an emergency plan for responding to such an attack.

Related Posts (10)  INTOXICATION BARBITURIQUES PDF

Whereas in the past, secret documents were locked behind sealed and guarded doors, the nature of today’s reliance on technology means that with enough motivation and the proper do, criminals and terrorists can sometimes gain access to information at the highest levels of government and the defense community.

The Executive Order tasked the board with recommending policies and coordinating programs for protecting critical infrastructure protection CIP -related information systems. Federal Register October 18,v. Support the Department of State’s coordination of United States Government programs for international cooperation covering international information infrastructure protection issues.

Executive Order is revoked. The Board’s wide ambit includes outreach to the private sector and state and local governments, information sharing, incident coordination and crisis response, recruitment of Executive Branch security professionals, coordination of research and development, law enforcement coordination, and international cooperation.

The Special Advisor reported to the Assistant to the President for National Security Affairs and 1323 the Assistant to the President for Homeland Security and coordinated with the Assistant to the President for Economic Policy on issues relating to private-sector systems and economic effects and with the Director of OMB on issues relating to budgets and the security of federal computer systems.

Most commonly, information terrorists aim to introduce viruses into computer systems enabling them either to steal critical information or to destabilize public systems. Work with industry, State and local governments, and nongovernmental organizations to ensure 1231 systems are created and well managed to share threat warning, analysis, and recovery information among government network operation centers, information sharing and analysis centers established on a voluntary basis by industry, 31231 other related operations centers.

Retrieved December 31, from Encyclopedia. Retrieved from ” http: Additionally, security should enable, and not unnecessarily impede, department and agency business operations. Consistent with the responsibilities noted in section 4 of this order, the Board shall recommend policies and coordinate programs for protecting information systems for critical infrastructure, including emergency preparedness communications, and the physical assets that support such systems.

Attacks launched over communications wires and computer networks can become manifest in numerous forms and with a large array of possible outcomes.