Preview

National Infrastructure Protection Plan and Risk Management Framework

Good Essays
Open Document
Open Document
951 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
National Infrastructure Protection Plan and Risk Management Framework
National Infrastructure Protection Plan and Risk Management Framework
D’Juan L. Sanders
Professor Rachelle Howard
SEC 310
February 1, 2013

Protecting the Nations Critical Infrastructure
The National Infrastructure Protection Plan’s risk management framework is a process structured to protect the Nation’s CIKR, DHS, and SSA’s assets, systems, networks, and functions by minimizing potential risks that may compromise integrity of these very important sectors. According to free dictionary.com (2013), a risk is any possibility of incurring misfortune or loss; hazard. The framework of this risk management process consists of following a number of steps, in a strategic order, to best assure optimal security and protection. Though eliminating all risks isn’t possible, these steps are geared to constantly improve on addressing existing and developing risks that may affect all that embodies our nation’s critical infrastructure. To accomplish this task, NIPP has first set goals and objectives to be able to understand why they need to protect this information, who to protect against, and how we will protect the infrastructure. NIPP enables DHS, SSA’s, and other partners to decide upon the best course of action to help minimize vulnerabilities within the infrastructure. They plan to organize to protect from physical, cyber, and human element aspects.
The Feedback Loop Design
The feedback loop consists of the continuous steps followed to protect from risks and then repeated in reverse order or loop to track progress and make improvements to protection and resiliency of CIKR. I feel as though this definitely strengthens the model because after the effectiveness is measured, you now know where you can improve. Looping back through the model allows updates, corrections, and improvements to be addressed through the process which consistently maintains continuously enhanced protection. Figure 1-1 shows these steps in the construction of the model.

Why Risk Management is



References: 1. dictionary.com (2013) 2. Weitz, R. Ph. D, (2010) article, How to Fix Homeland Security Critical Infrastructure Protection Plans: A guide for Congress. Retrieved from http://www.heritage.org/research/reports/2010/04/how-to-fix-homeland-security-critical-infrastructure-protection-plans-a-guide-for-congress. 3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf

You May Also Find These Documents Helpful

  • Powerful Essays

    271. Kral, P. (2011, December 5). Incident handlers Handbook. Retrieved January 2014, from Sans.org: http://www.sans.org/security-training/The incident Handlers Handbook…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Additionally, the directives describe the process that the Department of Homeland Security should use to tackle the protection of critical infrastructure. Moreover, it outlines a summary of the activities, which should be undertaken to define and prioritize critical infrastructure, coordinate protection, as well as reduce the susceptibility of critical infrastructure or the essential resources (Loeb,…

    • 501 Words
    • 3 Pages
    Good Essays
  • Best Essays

    “To prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies, the United States Government shall establish a single, comprehensive approach to domestic incident management.” —…

    • 2053 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    When it comes to risk management, risk mitigating controls are the key to reducing threats to the network infrastructure. These mitigating controls can be found within standards, such as ISO/IEC 27001, and suggest measures to take in order to reduce risk to an organization’s assets. It is important to understand what each of these controls are in regards to risk management as well as the types of assessments used in determining the proper methods in protecting the infrastructure of any network.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This security profile presents one control function from three primary policy and procedure controls. These controls are “System/New Technology Development Life Cycle” from Management Controls, “Security Training, Education, and Awareness” from Operational Controls, and “Remote Access” from Technical Controls. These controls are selected based on the lack of resolution based on information provided fiscal year 2006, 2010 (VA Office of Inspector General, 2011) and 2011 (VA Office of Inspector General, 2012) FISMA audits.…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Better Essays

    References: Ortmeier, P.J. 2009. Introduction to Security: Operations and Management. (3rd ed). Upper Saddle River, N.J.: Pearson Prentice Hall…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The National Incident Management System (NIMS) was developed by the Secretary of Homeland Security at the request of the President to integrate effective practices in emergency preparedness and response into a comprehensive national framework for incident management. It guides departments and agencies at all levels of the private sector, nongovernmental organizations, and the government by using a proactive and systematic approach to prevent, protect against, respond to, recover from, and mitigate the effects in order to reduce the loss of life and property and harm to the environment. NIMS also works hand in hand with the National Response Framework (NRF) and provides the template for the management of incidents, while the NRF provides the structure and mechanisms for national-level policy for incident management.…

    • 645 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Department of Homeland Security. (2007). National strategy for homeland security. Retrieved January 25, 2009, from the Department of Homeland Security Web at http://www.dhs.gov/xabout/history/gc_1193938363680.shtm…

    • 1888 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Hazard Administration

    • 1524 Words
    • 7 Pages

    Hazard administration is the recognizable proof, evaluation, and prioritization of dangers ( as the impact of instability on goals) trailed by facilitated and conservative utilization of assets to limit, screen, and control the likelihood as well as effect of deplorable occasions or to augment the acknowledgment of chances. Hazard administration's goal is to guarantee instability does not avoid the attempt from the business objectives.…

    • 1524 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure. You need this so that you know where to focus your attention.…

    • 585 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The NDMA, as the apex body for disaster management, is headed by the Prime Minister and has the responsibility for laying down policies, plans and guidelines for DM and coordinating their enforcement and implementation for ensuring timely and effective response to disasters. The guidelines assist the Central Ministries, Departments and States to formulate their respective DM plans. It approves the National Disaster Management Plans and DM plans of the Central Ministries/Departments. It takes such other measures, as it may consider necessary, for the prevention of disasters, or mitigation, or preparedness and capacity building, for dealing with a threatening disaster situation or disaster. Central Ministries/Departments and State Governments extend necessary cooperation and assistance to NDMA for carrying out its mandate. It has to oversee the provision and application of funds for mitigation and preparedness measures. NDMA has the power to authorize the Departments or authorities concerned, to make emergency procurement of provisions or materials for rescue and relief in a threatening disaster situation or disaster. The general superintendence, direction and control of the National Disaster Response Force (NDRF) is vested in and is exercised by the NDMA. The National Institute of Disaster Management (NIDM) works within the framework of broad policies and guidelines laid down by the NDMA.…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Since it was the first day of the field work during the rural camp, the team decided to start off by understanding the village of Jamak through the first tool of transect walk. The work done on day 1 is briefly described as under:…

    • 3618 Words
    • 15 Pages
    Powerful Essays