My posts have all been my original writing, but today is a summary of some thought provoking comments that I have found in my readings.

“Policymakers should be wary about creating unintended cyber risks with the ambitious adoption of new technology policies and programs in critical infrastructure. Smart grid technology, instance, has the potential to deliver electricity more efficiently for using computer-based and remote technology. Recognizing the importance of this technology, government leaders at the federal and state level developed policies and provided billions of dollars in grants to encourage private sector adoption across the United States. But, according to the Department of Energy Inspector General’s Audit Report: The Department’s Management of the Smart Grid Investment Grant Program, released in January 2012, grant recipients often did not adequately demonstrate cyber risk mitigations prior to their receipt of an award. In some cases, the accelerated process required developers and end users to work on implementing technology solutions far before the existence of mature products, security requirements, or standards”

Above quoted from Confronting Cyber Risk in Critical Infrastructure By Good Harbor Consulting

Key Questions a Government Agency Should Consider

“Will a local government’s actions, process, program or procedure negatively affect its credibility? Ex: Imagine if health information, probation or social services information were posted publicly on the Internet. (Confidentiality) 2. Health, welfare and detriment to the community Will a local government’s actions, process, program or procedure affect the health, safety and welfare of another? Ex: If information is corrupted, drug-testing results for school bus drivers changed, bridge height specifications altered, or a computer system slowdown delays updated information about a stolen car from reaching law enforcement, citizens’ health and safety may be at risk. (Availability) 3. Violation of the right to informational privacy or confidentiality Will a local government’s actions, process, program or procedure result in the breach of informational privacy or confidentiality? Ex: If unauthorized release of personal information, Social Security number, health information, drug testing results, etc., it may result in identity theft. 4. Accessibility and integrity of public records Will a local government’s actions, process, program or procedure prevent access to necessary records or result in changes to data in them?”

Above quoted from Multi-State Information Sharing and Analysis Center

I found this information very thought provoking. Please tell me your thoughts in the Comment Area. I am looking forward to reading your comments.