Preview

Assignment 2: Critical Infrastructure Protection

Better Essays
Open Document
Open Document
1279 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 2: Critical Infrastructure Protection
Assignment 2: Critical Infrastructure Protection
Eustace LangleyCIS 502
May-23-2013
Facilitator: Dr. Gideon U. Nwatu
Strayer University

Critical Infrastructure Protection
Introduction
The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure (The White House Office of the Press Secretary, February 2013). It is imperative for every nation to develop a critical infrastructure protection plan that will provide the essential services to its society. To archive this, a government must be proactive and coordinate its efforts that will reinforce and maintain secure, functioning, and resilient critical infrastructure. Examples of infrastructure are assets, networks, and systems that are critical to public confidence and the Nation's safety, prosperity, and well-being.
In order to answer the research questions, the monograph will examine the Department of Homeland Security’s. The monograph will also explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. Also, the description of the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure will be explained. The monograph will further evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure, and suggestions on methods improving the protection of our critical infrastructure and justifications recommendation will also be elaborated on (University of Strayer Materials, May, 2013).
Examination of the Department of Homeland Security’s
In 2002, The Homeland Security Act came into effect; it provides the basis for Department of Homeland Security (DHS) responsibilities in the protection of the Nation’s critical infrastructure and key resources (CIKR). The Department of Homeland Security



References: http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil. Retrieved May 10th, 2013 http://www.gao.gov/assets/590/587529.pdf . Retrieved May 14th, 2013 http://www.dhs.gov/blog/2013/05/13/working-international-partners-critical-infrastructure-protection. Retrieved May 14th, 2013 http://www.americanprogress.org/issues/economy/report/2013/04/18/60960/infrastructure-and-resilience-forging-a-national-strategy-for-reconstruction-and-growth/ Retrieved May 16th, 2013

You May Also Find These Documents Helpful

  • Better Essays

    Mgmt404 Project Plan

    • 1494 Words
    • 6 Pages

    To secure the parameter of the facility with security cameras within four weeks and not to exceed $20,000 for the entire project cost.…

    • 1494 Words
    • 6 Pages
    Better Essays
  • Best Essays

    The purpose of this paper is to become acquainted with the evolution of national incident…

    • 2053 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The National Infrastructure Protection Plan’s risk management framework is a process structured to protect the Nation’s CIKR, DHS, and SSA’s assets, systems, networks, and functions by minimizing potential risks that may compromise integrity of these very important sectors. According to free dictionary.com (2013), a risk is any possibility of incurring misfortune or loss; hazard. The framework of this risk management process consists of following a number of steps, in a strategic order, to best assure optimal security and protection. Though eliminating all risks isn’t possible, these steps are geared to constantly improve on addressing existing and developing risks that may affect all that embodies our nation’s critical infrastructure. To accomplish this task, NIPP has first set goals and objectives to be able to understand why they need to protect this information, who to protect against, and how we will protect the infrastructure. NIPP enables DHS, SSA’s, and other partners to decide upon the best course of action to help minimize vulnerabilities within the infrastructure. They plan to organize to protect from physical, cyber, and human element aspects.…

    • 951 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hsa Cycle

    • 310 Words
    • 2 Pages

    As explained by Graeme (2008), there are four main cycles in disaster preparedness, including prevention, protection, response and recovery. This is a major cycle that the Homeland Security Bill has worked in implementing antiterrorism routines. To achieve these objectives, HSA has prioritized three main areas. These include preventing any new attacks, reduce the vulnerability of the country to attacks, and minimize the damage in case of any attacks (Sharon, 2012). To achieve and adequately support the cycle from prevention to recovery, HSA improved its system to allow for easier coordination. Graeme (2008) that the security department has engaged different systems, including an Integrated Command System (ICS) and the National Incident Management…

    • 310 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Paper ESF 13

    • 1280 Words
    • 4 Pages

    University of Phoenix. (2009). National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency. Retrieved from University of Phoenix, GHS 563 website.…

    • 1280 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Stuxnet

    • 749 Words
    • 3 Pages

    United States Computer Emergency Readiness Team (US-CERT) is the Department of Homeland Security’s (DHS) primary effort to contend with cyber security issues, disseminate threat information to the public and private entitites, and ensure Constitutionaly rights are respected in those efforts. US-CERT is subordinate to the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) and monitors these threats on a 24-hour basis. US-CERT collections information on incidents and works with private and public partners that control industrial and commercial infrastructure to respond to incidents and reinforce U.S secuity in the industrial realm. (US-CERT, 2014)…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    n the domestic preparedness cycle prevention, protection, response, and recovery are all cited. The Homeland Security Bill tackles each one of these issues. By pulling together agencies such as FEMA Transportation Security Agency, and Customs Border and Patrol the committee is able to work with these agencies to fulfill DHS's mandate to protect the homeland from myriad threats at the borders, online, at our ports and more. (US Senate Committee, unknown). Chairman Carper and Member Coburn made it a priority for the committee to ensure that agencies work with the federal government in partnership with state and local government to prevent future disasters and to respond quickly and efficently. They are also working with other members to bolster…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1.24 (U) Risk Management Framework. DoDI 8510.01, Risk Management Framework (RMF) for DoD Information Technology, requirements are integrated throughout System Acquisition Lifecycle to control the cost and operational impact associated with known system vulnerabilities. In addition to Department of Defense Manual (DoDM) 5200.01 Volumes 1-4, DoD Information Security Program, NIST 800-60 Vol 1 and Vol 2, Guide to Mapping Type of Information and Information Systems to Security Categories, dated August 2008, and Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, were leveraged as guidance for classification of enclaves, networks, and information systems where…

    • 212 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    In 2007 “National Strategy for Homeland Security” was finally defined. During fiscal year 2008-2013, DHS devoted three of the five explicit goal categories to prevent terrorism. Goal 1. “protect our nation from dangerous people” Goal 2.” Protect our nation from dangerous goods” Goal 3. “Protect critical infrastructure” Goal 4.” Strengthen our nation’s preparedness and emergency response capabilities” Goal 5. “Strengthen…

    • 1191 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    It is difficult to state with confidence that our critical infrastructure—the backbone of our country’s economic prosperity, national security, and public health—will remain unscathed and always be available when needed.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The United States critical infrastructure sectors are at a higher risk of compromise due to cyberwarfare. The risk of any of these sectors in the United States either being comprised or destroyed will have a serious and lasting effect on the operations of the country as we know it. It can effectively cripple the nation if an adversary is successful in disabling just three or four sectors. “The cost-benefit ratio “levels the playing field,” especially in favor of Third World countries which lack considerable leverage in terms of exercising traditional military power;…” (Eun & Aßmann, 2014).…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    cyber security

    • 1147 Words
    • 5 Pages

    The critical infrastructure – such as the electricity grid, financial sector, and transportation networks that sustain our way of life – has suffered repeated cyber intrusions, and cyber-crime has increased dramatically over the last decade. The President has thus made cyber security an Administration priority. When the President released his Cyberspace Policy Review almost two years ago, he declared that the…

    • 1147 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Terrorism

    • 1710 Words
    • 7 Pages

    The growing reliance the United States has on information technology has created a new form of vulnerability, which allows terrorists indirect access to approach systems which would otherwise be completely inaccessible. The threat to the public and the government lies in the fact that cyber terrorists possess the ability to shut down major systems which the…

    • 1710 Words
    • 7 Pages
    Powerful Essays