Free Essay

Assignment 2: Critical Infrastructure Protection

In: Computers and Technology

Submitted By bbraxtonjr
Words 1124
Pages 5
Assignment 2: Critical Infrastructure Protection
Benard Braxton, Jr.
Dr. Bouaffo Kouame
CIS 502 – Theories of Security Management
May 17, 2015

The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015).
These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department of Homeland Security. These objectives and goals says what it means to prevent, to protect, to respond, and to recover. They also shows how build in security, to ensure resilience, and to facilitate customs and exchange (DHS, 2015).
There are thousands of people from across the all over the country who are responsible for executing these missions. These are the people who interact with the public, are responsible for security and public safety, operate our country’s critical services and infrastructures, develop technology, perform research, watch, prepare for, and respond to emerging disasters and threats (DHS, 2015).
The five homeland security core missions are to prevent terrorism and enhancing security; secure and manage our borders; enforce and administer our immigration laws; safeguard and secure cyberspace; ensure resilience to disasters; and focus on maturing and strengthening the homeland security enterprise (DHS, 2015).
The responsibilities of the Department of Homeland Security is to ensure the security and safety of the United States against terror attacks and disasters. After the terrorist attacks of September 11, the Department of Homeland Security has focused on preparations to deal with terrorism as well as to manage emergency management, customs, and border security (Wallechinsky, 2015).
Without money, food, drinking water, or electricity, society would shut down. So emergency and intelligence services, business enterprises, and public bodies are working together closely to protect these needed services, goods and processes. They increase the knowledge about how important sectors are interdependent, improve security against theft or sabotage, organize for a flu pandemic, continuity plans help critical sectors continue operating; cooperate more closely with current sectors and the police and safety regions (Protecting critical infrastructure, 2015). The Department of Homeland Security conducts evaluations on communities and infrastructure to help local government officials and businesses make decisions about the location of resources to improve security before an incident and recovery after an incident. The Department of Homeland Security also works with communities and businesses with limited resources to offer training and other tools to instruct the broader community on the need for critical infrastructure resilience and security, and to improve their current efforts (What We Do, 2015).

Our country’s safety relies upon resilient and secure critical infrastructure. The National Infrastructure Protection Plan (NIPP) outlines how private sector and government participants in the critical infrastructure community collaborate to achieve security, manage risks and resilience outcomes (National Infrastructure Protection Plan, 2013). NIPP offers a modernized approach to critical infrastructure resilience and security, focuses on integration of physical and cyber security efforts, a closer arrangement to national preparedness efforts, focus on cross jurisdictional and cross sector coordination to achieve better results, integration of information-sharing as an important element of the risk management framework, identifies the key role and knowledge of critical infrastructure operators and owners, integrates hard work by all levels of government, nonprofit, and private sectors by offering an inclusive partnership framework and identifying exclusive capabilities each participant brings to the national effort, replicates today’s integrated all-hazards environment, grounded in existing policy and business principles, and pushes action in the direction of long-term improvement (National Infrastructure Protection Plan, 2013).
The National Institute of Standards and Technology (NIST) is a federal agency under the sponsorship of the Undersecretary for Technology. It is concerned with developing technology and maintaining measurement standards to improve promote commerce, productivity, and improve the quality of life in the U.S. NIST oversees four major cooperative programs. The NIST Laboratories advances the national technology infrastructure. The Baldridge National Quality Program was created to boost distinction among United States manufacturers, health-care companies, service providers, and educational institutions. The Manufacturing Extension Partnership is a network of local centers that helps small manufacturers. The Advanced Technology Program function is to promote development and research of new technologies in the private sector (Knight, 2004).

Recreational hackers. For an unknown amount of people, attaining unauthorized access to communication systems and information is a most captivating and challenging incline. Often they purposely organize for their activities to be seen even while hiding their exact identities. While their drives do not include actual disturbance of service, the tools and techniques they perfect among their community are accessible to those with hostile intent (Sikich, 2008).
Criminal activity. Some are interested in personal monetary gain through manipulation of financial information, credit accounts or stealing services. In comparison to some hackers, these criminals usually hope their actions will never be detected, much less accredited to them. Organized crime groups may be interested in direct financial gain, terrorism, or acquiring national intelligence (Sikich, 2008).
My three suggestions to improve protection of the critical infrastructure would be to test, train and implement. The U.S.’s critical infrastructure, should be tested regularly to ensure that the proper countermeasures are taken in the event of a catastrophic disaster. Another option would be to get the appropriate personnel training. By having more individuals aware of the signs leading up to a disaster, this can in turn prevent disasters from happening. The last option would be to implement necessary improvements to the infrastructure. Each day there are more threats being created as well as improvements. By staying up to date and making implementations as new challenges arise allows users to be ahead of many attacks and adaptable to the newer threats.

References
DHS (2015) Our Mission. U.S. Department of Homeland Security. Retrieved from: http://www.dhs.gov/our-mission
Knight, Judson (2004) NIST (National Institute of Standards and Technology), United States Retrieved from: http://www.encyclopedia.com/topic/National_Institute_of_Standards_and_Technology.as px
National Infrastructure Protection Plan (2013) U.S. Department of Homeland Security. Retrieved from: http://www.dhs.gov/sites/default/files/publications/NIPP-Fact-Sheet- 508.pdf
Protecting critical infrastructure. (2015) Retrieved from: http://www.government.nl/issues/crisis-national-security-and-terrorism/protecting- critical-infrastructure
Sikich, Geary W. (2008) Critical Infrastructure Vulnerability: Retrieved from: http://cool.conservation-us.org/byauth/sikich/elements.html
Wallechinsky, David (2015) Department of homeland security. All Gov Retrieved from: http://www.allgov.com/departments/department-of-homeland- security?detailsDepartmentID=571
What We Do (2015) U.S. Department of Homeland Security. Retrieved from: http://www.dhs.gov/what-we-do…...

Similar Documents

Premium Essay

Critical Analysis #2

...Critical Analysis #2 – Article Critique Brent Melnyk Ethical Fundamentals – JRSB311 Wes Sallenback February 5, 2013 Sarah O’Donnell, on May 11, 2009, wrote an article for the Edmonton Journal entitled, 'No-zero' policy gives students a do-over; Deadlines in the adult world often just as flexible. She describes the Edmonton Public Schools policy of “No-Zero” and allows for both sides of a touchy subject to be heard. On June 1, 2012, Edgar Schmidt, the superintendent for Edmonton Public Schools, penned an open letter to the citizens of Alberta. He wrote “In order for students to be successful in school and in life, they need the knowledge, skills and attitudes to make a smooth transition into the world of work and post secondary education. By taking an all or nothing approach to a missed assignment, we are not doing our job as educators to prepare all students, including those who face significant challenges, to take the next step in their educational journey as a lifelong learner.” (Schmidt, 2012, Para 6.) Schmidt (2012) also said, “The reason we assign a certain grade is to give a student feedback on what they have learned. If a student writes a test and gets all the answers wrong, they are assigned a zero on that test. This tells the teacher the student does not know the material and needs extra support. The mark is then put in the context of all their other learning that takes place during the year. If, by the end of the year, the......

Words: 1841 - Pages: 8

Premium Essay

Understanding Critical Infrastructures

...•What have you learned from others' responses? Critical Infrastructure is the basic foundation of the National economy of United States of America along with its health and security. It is because the power that has been used peoples in their homes, water that has been drunk, transportation used for mobility and the system of communication which has been used for connectivity between different peoples all belongs to the existence of such critical infrastructures. As they are of very sensitive nature so their security and pre caution measures are also needed to be taken with great importance (Homeland Security, 2013). Critical infrastructure is defined as an asset, network or system, either real or virtual, which is of crucial importance to the United States of America and their destruction may cause a devastating effect on the national or economic security, public safety or health or combination of them. •What were the most compelling points from the interaction with your fellow students? The most compelling points that I though was how identical our process of thinking in the way we chose what sectors to write about and how valuable each one of those sectors contribute to our daily lives. I just can’t imagine how we couldn’t live without them and we as a nation have to what we can to protect all of our resources. •How did participating in this discussion help in your understanding of the Discussion Board task? By participating in the DB’s it give you an insight of what...

Words: 430 - Pages: 2

Premium Essay

My Critical Thinking Assignment

...Critical Thinking Assignment Critical Thinking Assignment Billy L Goe Apologetics 104-B35 Professor Obaina September 25, 2012 Critical Thinking Assignment 1 Part One: The Question of Origin The Quran states that "Allah created the heavens and the earth, and all that is between them, in six days" (7:54). While on the surface this might seem similar to the account related in the Bible, there are some important distinctions. After completing the Creation, the Quran describes that Allah "settled Himself upon the Throne" (57:4) to oversee His work. A distinct point is made to counter the Biblical idea of a day of rest: "We created the heavens and the earth and all that is between them in six days, nor did any sense of weariness touch Us" (50:38). Allah is never "done" with His work, because the process of creation is ongoing. Each new child who is born, every seed that sprouts into a sapling, every new species that appears on earth, is part of the ongoing process of Allah's creation. "He it is Who created the heavens and the earth in six days then established Himself on the Throne. He knows what enters within the heart of the earth, and what comes forth out of it, what comes down from heaven, and what mounts up to it. And He is with you wherever you may be. Allah sees well all that you do" (57:4). Retrieved September 20, 2012 from http://islam.about.com/od/creation/a/creation.htm The Question of Identity The Quran describes how Allah created Adam: “We created......

Words: 1723 - Pages: 7

Premium Essay

Critical Infrastructure Protection

...The summary determines Critical Infrastructure Protection (CIP) is an important Cyber Security initiative that requires careful planning and coordination in protecting our infrastructure: 1. What is the Department of Homeland Security’s Mission, Operations, and Responsibilities? 2. What is the Critical Infrastructure Protection (CIP) initiatives are; what are protected, and the methods used to protect our assets? 3. What are the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure? 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Three methods to improve the protection of our critical infrastructure DHS’s Mission The Homeland Security Act of 2002 created the Department of Homeland Security (DHS) began operations in 2003 it assigned the department the following critical infrastructure protection responsibilities it’s goals and objectives are to prevent, to protect, to respond, and to recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. DHS core mission consist of five homeland security missions “Prevent terrorism and enhancing security; Secure and manage our borders; Enforce and administer our immigration laws; Safeguard and secure cyberspace; Ensure resilience to disasters” (DHS.gov) Homeland security is a widely distributed and diverse refers to the collective efforts and shared......

Words: 1936 - Pages: 8

Premium Essay

Chapter 2 It Infrastructure and Support Systems

...Chapter 2 IT Infrastructure and Support Systems IT at Work IT at Work 2.1 Western Petro Controls Costs with its Trade Management System For Further Exploration: Which processes are being automated and why? PetroMan is a comprehensive trading system that triggers buying and selling activities and integrates contract management, risk management, accounting, and pipeline scheduler. Using the PetroMan, the company can place bids and automatically capture a contract for refined products; and schedule and confirm deliveries in pipelines. PetroMan also handles the resale of fuels, including electronic invoicing and a credit module that checks and tracks a customer’s credit risk. This tracking is done by hedging large purchasing contracts by selling futures on the New York Mercantile (Commodities) Exchange. By hedging, the company protects itself against the risk of a large drop in oil prices. The software is plugged directly into the primary commodity exchanges--automating the process. Why is controlling risk important? By hedging, the company protects itself against the risk of a large drop in oil prices. The software is plugged directly into the primary commodity exchanges--automating the process. Does PetroMan provide Western Petro with a competitive advantage? Explain. Competitive advantage is defined as the strategic advantage one business entity has over its rival entities within its competitive industry. Achieving Competitive Advantage strengthens and positions...

Words: 10310 - Pages: 42

Free Essay

Infrastructure Assignment - 4

...distribution and peer-to-peer sharing of very large files To share a file or group of files, a peer first creates a small file called a "torrent" This file contains metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution BitTorrent makes many small data requests over different TCP connections to different machines, while classic downloading is typically made via a single TCP connection to a single machine. distributed nature of BitTorrent leads to a flood like spreading of a file throughout peers. As more peers join the swarm, the likelihood of a successful download increases The peer creates a hash for each piece, using the SHA-1 hash function, and records it in the torrent file 2. Explain the similarities and differences between Frame Relay and Asynchronous Transfer Mode.  ATM and frame relay are two of the most common used methods for telecommunications between networks today. ATM, which stands for Asynchronous Transfer Mode, is a technology that arose from international standards relating to the transmission of data, voice, and video simultaneously over a network at speeds far faster than has been possible without the standards. ATM is also known for transporting communications at hundreds of megabits per second, which results in speedier service than Ethernet on local area networks. ATM has also ascended into being a standard for fixed-length cell switching. Cells that originate from various sources or from......

Words: 2038 - Pages: 9

Premium Essay

Assignment 2

...Draft Assignment 2: Ethics and Corporate Responsibility in the Workplace and the World Stakeholders:- The Stakeholders in this case are:- 1. PharmaCARE 2. PAC 3. The People and Government of Colberia 4. Executives of the PharmaCARE 5. PharmaCARE Clients Worldwide 6. FDA 7. OSHA 8. MR Alen Jones 9. CompCARE and Employees 10. Doctors and Hospitals who were dealing with CompCARE 11. Donna, Tom and Ayesha 12. Wellco The Ethics of PharmaCARE in Colberia:- Now days it has become a critical measure for companies (small and Large) to abide by ethical standards, which are designed to protect the well-being of society they are operating in and marketing with. In doing so companies, especially big corporations like PharmaCARE, are expected to have certain type of ethical standards as well as embrace and implement (CSR) corporate social responsibility policies and strategies in every aspect of their operation and beyond. According to David Vogel the definition of CSR is ‘practices that improve the workplace and benefit society in ways that go above and beyond what companies are legally required to do’ (Alexander (Sascha) K. Nussbaum). In light of this we can observe that the operational activities of PharmaCARE in Colberia were in fact completely contrary to the company’s claim of caring about the world. In spite of exploiting the people and the indigenous healers of the country, the fact that they did not have a tiny bit of......

Words: 1098 - Pages: 5

Free Essay

Critical Thinking Lecture 2

...Lecture 2 and Mid-term expectations Class structure 10am-1pm 10-10.20 Homework 10.20-11.30 Quiz below 11.30-11.50 Break 11.50-12.45 Euthyphro 12.45-1.00 Mid-term expectations Homework for Femke – reading and understanding how you reason – describe how you approach a problem . Step-by-step process . Quiz 1. A = Valid Socrates is a philosopher All philosophers are poor So Socrates is poor 2. A – iv Whenever Anile is here, Kumar is also here Anil is not here So Kumar is not here 3. A = iv Most drug addicts are depressed people Most depressed people are lonely So most drug addicts are lonely 4. A= v Nothing that s cheap is good So nothing that is good is cheap 5. A = v If there is an earthquake , the detector will send a message No message has been sent So there was no message 6. A = iv John said that everyone loves Mary Nothing that John has said is true So nobody loves Mary Mid-term This assignment is designed to assess your critical thinking problem solving, and communication skills. Your answer will be judged for its clarity, relevance, coherence, logic, depth, consistency, and fairness. Your answers to each issue should be between 700-800 words in length. More specifically, the reader will be asking the following questions: 1. Is the question at issue well stated? Is it clear and unbiased? Does the expression of the question do justice to the complexity of the matter at issue?  2.......

Words: 1681 - Pages: 7

Premium Essay

Critical Infrastructure Protection

...importance of Critical Infrastructure Protection (CIP) and the mythology behind this since the attacks of 9/11, as well as a brief history of Critical Infrastructure Protection pass to the present to include attacks from the cyber arena. These attacks are prone to come indirect or direct which will and could affect our need and use for resources for life as we know it based on living naturally on a daily bases, these threats maybe man made or by natural disaster. Problem statement Prior to the attacks of 9/11 there was no main concern with the protection of Critical Infrastructure within the United States from any avenue. As we moved on into the 21 century the threat has evolved from more than just protecting water source, and power plants. With the information age this issue has shown another form of crippling the United States economy with just the push of a button. How we to protect these infrastructures from threats that may not be seen or those from natural disasters is a question for now and the future. Purpose statement I have chosen this particular subject due to the nature of its importance to national security, economy, as well as the everyday needs of Americans to survive. The awareness for the protection of our critical infrastructure is a necessity for the present and future of America’s well fair. Research questions Q1. When did the United States began showing concern for critical infrastructure and why? Q2. Why is the protection of critical......

Words: 786 - Pages: 4

Free Essay

Critical Infrastructure Protection

...Critical Infrastructure Protection Pamela S. York CIS502, Dr. Glenn Hines 2/14/15 Abstract The explosion of the accessibility of information and data via the today’s Web has brought along the concern and need for cyber security. With these issues of cyber security has also come the need to protect national informational assets from hackers and such who utilize the Web as a means to attack information that can aid in cyber terrorism. Information professionals are now looking to measures of protection that will ensure private citizens are not put into danger by the threat of cyber espionage. This also has extended to the protection of critical infrastructure within the United States and abroad. Critical Infrastructure Protection With the ever evolving presence of cyber-attacks that threaten to put citizens’ privacy and Internet security at risk, the government has had to intervene in order to take measures to protect its’ citizens due to the alarming fact that cyber-attacks are replacing other modes of attacks by terrorists. The Department of Homeland Security, created in 2002, was developed to carry out broad missions such as preventing terrorist attacks within the United States. This was mainly in response to the terrorist attacks that occurred on U.S. soil on September 11, 2001. Since then the DHS has taken on the mission of developing security that extends to information security and developing plans to implement critical infrastructure. The Homeland Security......

Words: 1329 - Pages: 6

Free Essay

Critical Infrastructure Protection

...The U.S. CIP is a national program to ensure the security of vulnerable and interconnected infrastructures of the United States The United States possesses both the world's strongest military and its largest national economy. Those two aspects of our power are mutually reinforcing and dependent. They are also increasingly reliant upon certain critical infrastructures and upon cyber-based information systems. Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government. They include, but are not limited to, telecommunications, energy, banking and finance, transportation, water systems and emergency services, both governmental and private. Many of the nation's critical infrastructures have historically been physically and logically separate systems that had little interdependence. As a result of advances in information technology and the necessity of improved efficiency, however, these infrastructures have become increasingly automated and interlinked. These same advances have created new vulnerabilities to equipment failure, human error, weather and other natural causes, and physical and cyber attacks. Addressing these vulnerabilities will necessarily require flexible, evolutionary approaches that span both the public and private sectors, and protect both domestic and international security. Because of our military strength, future enemies, whether nations, groups or individuals, may seek to harm us in......

Words: 468 - Pages: 2

Premium Essay

Assignment 2 Critical Infrastructure Protection

...        Assignment 2: Critical Infrastructure Protection Strayer University Introduction In the wake of a terrorist attack, natural disaster, or emergency, the Department of Homeland Security (DHS) is prepared to respond.   DHS primary responsibilities are combatting terrorism, securing boarders, enforcing immigration laws, safeguarding cyberspace, and responding to natural disasters. Coordination with the federal response teams and partnerships with local, state, and private sectors, enhance the DHS response tactics in a national emergency. Department of Homeland Security Mission, Operations, and Responsibilities The Department of Homeland Security’s mission is to keep America safe, protected, and resilient from various elements that threaten the country.  As identified by (dhs.gov, 2013) DHS has three key concepts that strategies are based upon security, resilience, and customs and exchange.  The process that defines homeland security missions and incorporates the key concepts is the Quadrennial Homeland Security Review (QHSR). DHS missions are spread across the enterprise and do not only cover DHS.  The delegated missions define in detail how to prevent, protect, respond, recover, secure, ensure resilience, and facilitate customs and exchange as noted by (dhs.gov, 2013).     Department of Homeland Security operations encompass five core objectives.  The objectives covered under DHS are prevention of terrorism and enhancing security; secure and manage our boarders;......

Words: 1685 - Pages: 7

Premium Essay

Critical Thinking Assignment

...Critical Thinking Assignment Part I Buddhism 1. Origin – In the Buddhist Worldview, life and the world have no beginning or end. “There is no reason to suppose that the world had a beginning at all. The idea that things must have a beginning is really due to the poverty of our thoughts” (Russel, 1924) Creation occurs repeatedly throughout time. 2. Identity – The Buddhist believe that they are an impermanent collection of aggregates/for some personal existence continues for a while. 3. Meaning/Purpose – Buddhists believe suffering is real it is not an illusion and that it is the reason man is trapped in the cycle of reincarnation. The purpose is to “eliminate suffering by eliminating desire or craving that which is temporary” (Weider & Gutierrez, 2011 p. 60). This can be achieved by following the four noble truths and the eightfold path, which lead to a state of Nirvana. Buddhists believe we suffer because we strive to hold on to things, which do not give lasting happiness. 4. Morality – It is directly woven into Buddhist teachings. The Third Noble Truth, “The way to liberate oneself from suffering is by eliminating all desire”. The Eightfold path connects to morality with the concepts of right speech, right action, and right livelihood. 5. Destiny - In the Buddhist Worldview, our destiny is not controlled by God but, by us. Actions we take and decisions we make determine if we have good or bad karma. When we go through the cycle of reincarnation,...

Words: 501 - Pages: 3

Free Essay

Cis 502 Critical Infrastructure Protection

...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...

Words: 1288 - Pages: 6

Premium Essay

Assignment 2

...Assignment 2: Harnessing Information Management, the Data, and Infrastructure Due Week 4 and worth 120 points In Assignment 1, you investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected in Assignment 1. Use the Internet or Strayer Library to explore the relationship between information management and data storage techniques. Write a four to six (4-6) page paper in which you: Ascertain the importance of information management for the company or industry that you have chosen. Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice versa. Suggest at least two (2) data storage methods regarding database, data warehouse, and / or date mart for your chosen company or industry. Provide a rationale for your response. Determine the optimal data storage method between the methods that you suggested in Question 3. Provide a rationale for your response. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.......

Words: 336 - Pages: 2