Preview

National Infrastructure Protection Plan and Risk Management Framework

Good Essays
Open Document
Open Document
951 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
National Infrastructure Protection Plan and Risk Management Framework
National Infrastructure Protection Plan and Risk Management Framework
D’Juan L. Sanders
Professor Rachelle Howard
SEC 310
February 1, 2013

Protecting the Nations Critical Infrastructure
The National Infrastructure Protection Plan’s risk management framework is a process structured to protect the Nation’s CIKR, DHS, and SSA’s assets, systems, networks, and functions by minimizing potential risks that may compromise integrity of these very important sectors. According to free dictionary.com (2013), a risk is any possibility of incurring misfortune or loss; hazard. The framework of this risk management process consists of following a number of steps, in a strategic order, to best assure optimal security and protection. Though eliminating all risks isn’t possible, these steps are geared to constantly improve on addressing existing and developing risks that may affect all that embodies our nation’s critical infrastructure. To accomplish this task, NIPP has first set goals and objectives to be able to understand why they need to protect this information, who to protect against, and how we will protect the infrastructure. NIPP enables DHS, SSA’s, and other partners to decide upon the best course of action to help minimize vulnerabilities within the infrastructure. They plan to organize to protect from physical, cyber, and human element aspects.
The Feedback Loop Design
The feedback loop consists of the continuous steps followed to protect from risks and then repeated in reverse order or loop to track progress and make improvements to protection and resiliency of CIKR. I feel as though this definitely strengthens the model because after the effectiveness is measured, you now know where you can improve. Looping back through the model allows updates, corrections, and improvements to be addressed through the process which consistently maintains continuously enhanced protection. Figure 1-1 shows these steps in the construction of the model.

Why Risk Management is



References: 1. dictionary.com (2013) 2. Weitz, R. Ph. D, (2010) article, How to Fix Homeland Security Critical Infrastructure Protection Plans: A guide for Congress. Retrieved from http://www.heritage.org/research/reports/2010/04/how-to-fix-homeland-security-critical-infrastructure-protection-plans-a-guide-for-congress. 3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    271. Kral, P. (2011, December 5). Incident handlers Handbook. Retrieved January 2014, from Sans.org: http://www.sans.org/security-training/The incident Handlers Handbook…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Additionally, the directives describe the process that the Department of Homeland Security should use to tackle the protection of critical infrastructure. Moreover, it outlines a summary of the activities, which should be undertaken to define and prioritize critical infrastructure, coordinate protection, as well as reduce the susceptibility of critical infrastructure or the essential resources (Loeb,…

    • 501 Words
    • 3 Pages
    Good Essays
  • Best Essays

    “To prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies, the United States Government shall establish a single, comprehensive approach to domestic incident management.” —…

    • 2053 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Department of Homeland Security. (2007). National strategy for homeland security. Retrieved January 25, 2009, from the Department of Homeland Security Web at http://www.dhs.gov/xabout/history/gc_1193938363680.shtm…

    • 1888 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure. You need this so that you know where to focus your attention.…

    • 585 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hazard Administration

    • 1524 Words
    • 7 Pages

    Hazard administration is the recognizable proof, evaluation, and prioritization of dangers ( as the impact of instability on goals) trailed by facilitated and conservative utilization of assets to limit, screen, and control the likelihood as well as effect of deplorable occasions or to augment the acknowledgment of chances. Hazard administration's goal is to guarantee instability does not avoid the attempt from the business objectives.…

    • 1524 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The NDMA, as the apex body for disaster management, is headed by the Prime Minister and has the responsibility for laying down policies, plans and guidelines for DM and coordinating their enforcement and implementation for ensuring timely and effective response to disasters. The guidelines assist the Central Ministries, Departments and States to formulate their respective DM plans. It approves the National Disaster Management Plans and DM plans of the Central Ministries/Departments. It takes such other measures, as it may consider necessary, for the prevention of disasters, or mitigation, or preparedness and capacity building, for dealing with a threatening disaster situation or disaster. Central Ministries/Departments and State Governments extend necessary cooperation and assistance to NDMA for carrying out its mandate. It has to oversee the provision and application of funds for mitigation and preparedness measures. NDMA has the power to authorize the Departments or authorities concerned, to make emergency procurement of provisions or materials for rescue and relief in a threatening disaster situation or disaster. The general superintendence, direction and control of the National Disaster Response Force (NDRF) is vested in and is exercised by the NDMA. The National Institute of Disaster Management (NIDM) works within the framework of broad policies and guidelines laid down by the NDMA.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Since it was the first day of the field work during the rural camp, the team decided to start off by understanding the village of Jamak through the first tool of transect walk. The work done on day 1 is briefly described as under:…

    • 3618 Words
    • 15 Pages
    Powerful Essays