Verified Document

Infrastructure Protection Assessment

¶ … Infrastructure Protection Utilities such as water, natural gas, and electricity are considered lifelines for the United States and its economy. Are they vulnerable to terrorist attacks or natural disasters? How can they be protected and secured?

Importance of Infrastructure

Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. They support and maintain the economic operation and activities of our communities and help to maintain the functions, security, safety and stability of society. Our economy, national defence, and quality of life are increasingly reliant upon certain critical infrastructures.

As technology advances, more and more critical infrastructures become increasingly interconnected. More specifically, there is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service (Haimes, 2005). Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A malicious attack, natural disaster, or simply increasing stress on already congested infrastructure could have dramatic impact.

Infrastructure and Security

Subsequent to the events of 9/11, Public Law 107-56, better known as the U.S.A. Patriot Act, was issued. Section 1016 of the act, entitled the Critical Infrastructures Protection Act of 2001, provides the following formal definition of the critical infrastructure: "Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters." It further states: "This national effort requires...

Congress, 2001).
Infrastructure Networks

The definition of infrastructure networks has evolved considerably, especially since the attacks of September 11, 2011. A comprehensive reference of this evolution is given by Moteff and Parfomak (John, 2005). The growing interdependence and associated vulnerabilities in networked systems has been highlighted in public law. The U.S.A. PATRIOT Act states:

Private business, government, and the national security apparatus increasingly depend on an interdependent network of critical physical and information infrastructures, including telecommunication, energy, financial services, water, and transportation sectors (Federal Highway Administration and Cambridge Systematic, 2005).

Although often ignored in analysing other networks, social networks usually play a key role in the operation and development of other types of networks. For example, in infrastructure networks, humans interact with these networks as managers, operators, and users. While humans play an important role in the efficiency and security of infrastructure networks, they are also "the most susceptible to failure and the most adaptable in the management of recovery," (Massoud, 2002) therefore, "we will not be able to attack the technical and human portions of the network separately...destroying terrorists network requires combinations of physical and social approaches" (Robert, 2005). The effectiveness and response of a network during and after an attack are determined by humans. For example, "the effectiveness of attacking a power grid may depend on how the operators respond to limit the damage or redirect power" (Robert, 2005).

Vulnerabilities associated with…

Sources used in this document:
References

Federal Highway Administration and Cambridge Systematics Inc., (2005) "An Initial Assessment of Freight Bottlenecks on Highways," Federal Highway Administration, Cambridge Systematics, Inc.

John Moteff and Paul Parfomak. (2004) Critical Infrastructure and Key Assets: Definition and Identification

Massoud Amin. (2002). Toward Secure and Resilient Interdependent Infrastructures. Journal of Infrastructure Systems, 8:67

Robert G. Spulak and Jessica G. Turnley. (2005) Theoretical Perspectives of Terrorist Enemies as Networks. JSOU Press
Cite this Document:
Copy Bibliography Citation

Related Documents

Infrastructure Protection Cyberspace Priority 1:
Words: 542 Length: 2 Document Type: Thesis

This creates a platform for further threat. It does not seem that this is receiving a large amount of attention. Physical Protection of Infrastructure 1. Priority: Planning and resource allocation: An action item for this priority is to help private organizations to implement enhanced security measures. Such measures will be rewarded with cost-effective incentives from the government. This action appears to have received considerable attention. Numerous government grant programs have been implemented

Infrastructure Protection in Homeland Security
Words: 1645 Length: 5 Document Type: Term Paper

S. To cope with any disaster or unforeseeable eventual attack on the critical infrastructure, to avoid the 9/11 mayhem and lack of organization. Respond; where disaster responsiveness and action at the time of the attack and shortly after is looked into, there is a well laid out proposed plan of how to handle any uneventful eventuality on any of the critical 'node' of the U.S. infrastructure. Lastly recover; which lays out

National Infrastructure Protection Plan NIPP
Words: 962 Length: 3 Document Type: Essay

NIPP (National Infrastructure Protection Plan) The NIPP was drafted in the year 2006 by the DHS (Department of Homeland Security). The Plan was part of Presidential Directive 7 for Homeland Security and it was developed to boost security, and resilience and to help secure critical infrastructures from security threats. The plan included a thorough risk management guideline and defined the roles and responsibilities of the DHS with regards to CIP (Critical

Critical Infrastructure Protection Using Computers in Modern Society...
Words: 693 Length: 2 Document Type: Essay

Critical Infrastructure Protection Nowadays, computers have become very ubiquitous in the American society. Computers and related technologies are used at every level of government in the United States. Computer technologies are also used by all sorts of professionals, and private citizens to access information, store information, communicate, and/ or transform acquired information. Right now, there are also computer-dependent technologies that are used to monitor and control, critical transportation systems, water treatment

Protection of Vulnerable Infrastructure
Words: 894 Length: 3 Document Type: Essay

Infrastructure Vulnerability and Protection The efficient operation of any city in the world depends on the level of the infrastructure that is available, indeed even the far removed areas from the city can only be categorized as accessible and habitable with the introduction of the necessary infrastructure. Infrastructure has been the yardstick for measuring the level of civilization in any part of the world, with regions that lack basic infrastructure

Role of Two It Infrastructure
Words: 529 Length: 2 Document Type: Essay

However, as the technology continues to evolve along multiple fronts, the prospect of connecting and integrating various systems and functions in a manner that is effective and seamless becomes that much more important. Moreover, that integration must be implemented in multiple areas to allow business organizations to function efficiently and profitably. In that regard, there are two primary areas of system integration where consulting professionals typically play the most

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now