Although emergency planning and operations have been conducted without a real consideration of integrating Internet into emergency operations, recent developments in Internet and computer technology have made it possible to change the ICS to allow for stronger (an assumption) external control of all types of emergencies.
There are obvious advantages and disadvantages to using Internet during emergencies. One problem is that the Internet was not developed with security in mind. There is no governing body on the Internet to ensure compliance with security measures. Although freedom from authority fosters innovation, it has an adverse effect on security.
The distributed denial of service (DDoS) attacks in February 2000 illustrate how lax individual security can affect Internet security. Attackers used intermediary sites to launch attacks on the targeted sites. These activities were not transparent to the intermediate sites. Consequently, the intermediate sites did not realize they needed to implement security measures to prevent the attackers from using them to attack the targeted sites; further, they had no motive, other than general good will, to close the vulnerabilities on their sites that facilitated the DDoS attacks.
Without some central authority to ensure full implementation of security measures, each organization is more or less on its own and can be at the mercy of other organizations whose concern about security is far less than their own, or maybe even nonexistent. For local and state emergency response agencies to trust the Internet with their most sensitive data, additional precautions must be taken to ensure the right people are accessing the emergency response networks and that only authorized users can read transient data.
Based on this brief discussion, do you believe that the significant use of Internet in emergency operations will be limited until they can be conducted safely on the Internet?
Thank you for requesting me. I hope this helps. Please let me know if you have any questions.
I believe the significant use of the Internet in emergency operations will be limited until these operations can be conducted safely on the Internet. As the case study states, the Internet lacks a governing body and is susceptible to being used for malicious activity (Morozov, 2010). In an emergency, there is little time to weigh the validity of information and secure clear Internet channels for all. However, during emergencies, communication is of the utmost importance: to communicate ...
This solution provides a discussion about whether the Internet should be used during emergency operations in light of the idea that communication could be compromised. It includes citations and APA formatted references.