Running Head: SECURITY & INFRASTRUCTURE
Assignment 2: Critical Infrastructure Protection (CIP)
Clara Mae Jones
Instruction: Dr. Patricia White
CIS 502 – Theories Security Management
May 16, 2013
When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so vital in the United States that their incapacitation or destruction would have a debilitating effect on security, national economy security, and national health, or any combination thereof. Examine the Department of Homeland Security’s Mission, Operations, and Responsibilities
The Department of Homeland Security are wide-ranging, and their goal is clear: “A safer, more secure America, which is resilient against terrorism and other potential threats.” The three key concepts form the foundation of our national homeland security strategy designed to achieve this vision: The three are as follows 1) Security 2), Resilience 3), Custom and Exchange. These concepts drive broad areas of activity that the Quadrennial Homeland Security Review (QHSR) process defines as homeland security missions. It prevent, to protect, to respond, and recover, as well as to build in security, to ensure resilience, and to facilitate customs and exchange. The responsibility falls on hundreds of thousands of people from across the federal government, state, local, tribal, and territorial governments, the private sector, and other nongovernmental organizations are responsible for executing these missions. To be more detailed about the mission, operations, and responsibilities of DHS as follows, prevent terrorism and enhance security (protect the American people from terrorist threats). Secure and manage our borders (using technology, manpower and physical infrastructure to improve operational control of our borders). Responsible for facilitating legal immigration and enforce laws (supports legal employment by offering information and expanding E-Verify program). Safeguard and secure cyberspace (analyzes and reduces threats and distributes warnings, and ensure disaster resilience The DHS provides the coordinated responses to terrorist attacks on air, land, sea; also, natural disasters or other large emergencies while working with the public sector partners (Homeland Security, 2013, 2011; Lopez, Roman, 2007; Wilshusen, 2011). Critical Infrastructure Protection (CIP) Initiatives are; what are Protected, and the Methods used to Protect Our Assets. Critical infrastructure protection (CIP) are essential for the survival of the nation. It have many definitions and they all mean the same thing, just expressed in different ways. It is define. It is define by the USA Patriot Act as systems and assets, whether physical or virtual. It is so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national public safety national, national economic security, or any combination of those matters. FEMA defines critical infrastructure as personal, physical assets and communication (cyber) that must be intact and operational 24-7 (365 days a year). In order to ensure survivability, continuity of operations, and mission success. Essential people, equipment, and systems are or/and mission success the availability of 24-7 is a necessity. In other words essential people, equipment, and systems, pertinent data,...
References: Homeland Security: The Department of Homeland Security, 2013.
O’Neil, M., Dempsey, J. (2007). Critical infrastructure protection: Threats to privacy and other civil liberties and concerns with government and the private mandates on industry: Depaul Business Law Journal, Vol. 12, p. 97.
Please join StudyMode to read the full document