Homeland Security: Critical Infrastructure Protection

Improved Essays
Introduction
Critical infrastructure is the fundamental structure of modern society. Human beings largely depend on systems for survival in the harsh economic environment. Everything around, tangible and intangible alike, has a purpose of making life easier for humanity. As time progresses, the Infrastructures continue to develop and become more sophisticated. More advanced inventions have more functionalities than the less complex ones. Continued improvement of resources covers loopholes that the previous developments had overlooked thus gaining a new aspect different from the previous infrastructures. However, advancements in technology create new risks and vulnerabilities in Critical Infrastructure. Over-reliance on technology and institutions,
…show more content…
President Bill Clinton signed a presidential directive (PPD-63) regarding the subject of critical infrastructure protection. The document identified sections of the National Infrastructure as essential to the well-being and security of the United States. Also, the contents looked into the safety and interests of citizens and the necessary procedures to apply. President Bush updated the paper using the Homeland Security Presidential Directive (HSPD-7) of December 2003. He renamed the program as Critical Infrastructure Identification, Prioritization, and Protection (CIIPP). The decree, that later became National Infrastructure Protection Plan (NIPP), focused on the importance of Critical Infrastructure Protection in the budget and implementation. Some Departments are so important to the United States that the incapability of such systems and reserves would devastate the security, national economy, national public health and safety (Ryan, …show more content…
In 1995, America had heard of a major cyber-attack where hackers made away with $12 million from customers’ bank accounts. During those periods networks and systems were logically and physically separate. Such isolation exposed the systems to vulnerabilities thus advanced technology automated the sectors thus interlinked the systems using computers and soft-wares. Consequently, the gas, telecommunications, financial services and oil sectors interlink thus removing traditional security borders. The created interrelationships are more vulnerable to cyber interferences and physical disturbances due to singleness of failure stages. As an example, the capacity of the information and communication sector empowers the nation to organize government processes and business deals. One tragic failure has the potential of completely destroying the multiple systems such as emergency services, financial services, and dam control. As such, the Presidential Directive mandated several agencies to come up with plans and implement security protocols (Wurstbauer & Schäfers,

Related Documents

  • Improved Essays

    The terrorist attacks of September 11th reshaped the governments focus on the domestic security of the United States and its citizens. Established after the terror attacks of September 11th the DHS combined multiple agencies into one agency which reports directly to the President of the United States. The Department of Homeland Security (DHS) faces the daunting task of protecting the continental United States from terrorism threats. After the attacks the government set out to ensure the US would never face another situation or attack like the one that had occurred. In order to do so the government had to transform the way it handled one major component, Intelligence.…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    According to the textbook, the Homeland Security Advisory System or HSAS was created to help inform United States, (U.S.) citizens from prospective terrorists attacks (Gaines & Kappeler, 2012, p. 17). The HSAS have five, color coded, divergent levels of risks for terrorist attacks against the United States. These colors consist of red, which stands for a severe risk; orange, which stands for a high risk; yellow, which stands for a significant risk; blue, which stands a general risk; and finally, green, which stands for a low risk of terrorists attacking (Gaines & Kappeler, 2012, p. 16). Although the HSAS was an effective tool for U.S. citizens to stay informed of the current risk level of a terrorist threat, it only provides a general analysis of the posted threat. Therefore, many people might have viewed the HSAS as not very informative.…

    • 413 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    It is highly important that we protect critical infrastructures, because they provides us all with essential services and are all vital to the United States. Critical infrastructures are vital to our security, economy, and survival of the nation. The National Response Team, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, the Transportation Security Administration, FEMA, Federal Air Marshal Service, and all levels of the government should be involved in planning the response to the bombing. It is necessary to have all these agencies together in order to better respond to attacks and protect our critical infrastructures.…

    • 224 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Former President Bush was the one who required federal agencies to develop and implement policies and systems that are set in place to enhance sharing information, by issuing several executive orders. Information sharing is the number one key to how the resources are used to accomplish task. There are many agencies set into place to protect the homeland also, we have community policing that assist in accomplishing the task and working with homeland…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    As we continue through the 21st century there are numerous missions that the DHS encourages to anticipate terrorist acts, secure the wellbeing of our country, and to save our opportunity and thriving. There are an extensive variety of missions that the division oversees, for example, anticipating terrorism and improving security, overseeing U.S. outskirts, controlling movement laws, securing the internet, and guaranteeing calamity versatility. Our central goal is to organize a far reaching and strong office to battle demonstrations of fear, react in an auspicious way to calamities and to secure the U.S. against acts that are completed to annihilate us. In counteracting terrorism and improving security the office considers this the most astounding…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The establishment of the Integrated Risk Management policy happened in 2010. The Homeland Security secretary saw it as a security measure to help in managing risk in different areas of that are vulnerable to threats. The essentiality of this policy is the basis that security partners can most efficiently handle risk through working together. It is necessary to build, sustain, and incorporate the capabilities of management with Federal, local, state, territorial, tribal, private sector, and nongovernmental partners of homeland security including families, individuals, and communities. Whereas successful incorporation involves execution across the whole enterprise of homeland security, the Department of Homeland Security (DHS) has an important…

    • 1169 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    ACKNOWLEDGEMENTS The Critical Asset Identification and Protection recommendations and guidelines presented to Embry-Riddle Aeronautical University in this document is the collaborative work of a group of students in HS315 – Critical Infrastructure Protection and Risk Analysis. This report will satisfy the course’s Student Learning Outcome (SLO) by primarily demonstrating the evolution and basic principles of critical infrastructure protection principles, processes, and techniques. Secondly, the recommendations and guidelines presented will be developed using the knowledge of threat, vulnerability, and consequence using a risk-based analysis methodology while understanding each unique critical infrastructure and the specific appropriate countermeasures.…

    • 494 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In our nation’s infrastructure, the Government Facility Sector covers a large amount of buildings both stateside and at oversees. Many of these facilities are open public places and deal with business, recreational and business activities. According to (Logan & Ramsay,2012,p.77),” Critical Infrastructure protection and resilience takes place in an environment of policy, strategy, plans, and laws at the national, state, and local levels.” In that, many of these locations are leased, or owned by federal, state and local levels of government. The Governmental facility Sector can include military bases, office buildings, laboratories, courthouses, educational facilities, etc.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Power Outage Case Study

    • 1649 Words
    • 7 Pages

    In managing a network problems with the network are to be expected and planned for when and where possible. Many of these plans created to deal with problems cover what to do if a part of the system is attacked or compromised along with what to do in the event of a natural disaster. This does not mean everything is covered as some problems are deem unlikely or a minor enough event that it should not be a problem to deal with. One potential problem that can find itself label in such a way are power outages as this is a problem but not one likely to be viewed as overly serious as they do not happen often and when they do they tend to be brief. This issue along with what types of problems and solutions to each is what will be focused on for this…

    • 1649 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Incident managers should be well versed with the emergency protocols such as coordination, information sharing and backup procedures that are necessary under such circumstances. These principles provide security strategists the necessary guidelines to implement an effective security apparatus. With data security becoming one of the top concerns for organizations that handle sensitive customer information, it is important that security analysts look at the holistic picture of the security landscape rather than having a narrow scoped approach to protect and improvise their security…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    One of the fastest growing fields is information technology, because computers are a part of most people’s lives and businesses. A recurrent topic in the news today is computer hacking. Recently, several companies have been hacked into and customers’ digital information has been stolen. Even the government can’t seem to keep its information safe. Everyday, people’s identities are stolen because their online bank has been hacked into.…

    • 1772 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Physical Security As Margaret Rouse of TechTalk.com stated, “Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.” In the world we live in today physical security is often over looked (Rouse, 2005). News organizations sensationalize the hacker as being the greatest threat to information security as we know it and it may be the case.…

    • 1797 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Physical security is often overlooked (and its importance underestimated) in favor of more technical and dramatic issues such as hacking, viruses, Trojans, and spyware. However, breaches of physical security can be carried out with little or no technical knowledge on the part of an attacker. Moreover, accidents and natural disasters are a part…

    • 848 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity

    • 823 Words
    • 4 Pages

    The reliance of the national and world economies on the global supply chain make them vulnerable to any number of incidents, including deliberate attack, natural disasters and accidents. Furthermore, the supply chain’s existence on both land and sea require several different modes of transportation to function properly. Each of these different modes of transportation present unique security challenges, which must be addressed in order to ensure the efficient flow of goods across the globe. Of the different modes of transportation associated with the global supply chain, the maritime security element, specifically, container shipping and its associated operations (i.e. port operations), are the most vulnerable.…

    • 823 Words
    • 4 Pages
    Improved Essays