CJ 682 7-2 Milestone Three Revised

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

682

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

12

Uploaded by CountOctopus1696

Report
1 7-2 Final Project Milestone Three: Draft of Criticality/Impact and Mitigation/Countermeasure Sections Viktoria Prifti CJ 682 Threat Assessment – 7-2 Milestone Three Professor Henderson 11/06/2023
2 V. Consequence Assessment Introduction Hanscom Air Force Base is a critical asset for the Bedford community. Albeit operating as a military installment, the facility is also responsible for managing the local airport, which relives the regional Boston Logan International Airport. Nonetheless, it offers numerous job opportunities to people within the area, thereby boosting Bedford's economic stature. Considering its importance, a consequence analysis was conducted to determine the impact of an attack on the human, economic, public confidence, and government capability aspects. The analysis process used a worksheet that was informed by data regarding the asset, threat, and vulnerability. Furthermore, the researcher complemented data from local government, jurisdictional, and the U.S. Census Bureau resources with critical thinking to determine the level of criticality. Importance of the Asset Human The findings derived from the research and critical thinking revealed that the asset is important to the Bedford community. From a human impact perspective, one can surmise that the base has a workforce comprising 10,306 workers [ CITATION Han232 \l 1033 ]. The high number of employees increases the risk of attacks, which contribute to at least 3,500 injuries and 150 deaths. Furthermore, at least 10% of the 1917 people living inside the base are exposed to death and injuries emanating from an attack by the Taliban [ CITATION Dat23 \l 1033 ]. Similarly, the base is near the MIT Lincoln Library, which accentuates the risk of chemical attacks. Hazardous materials can also be released into the area, with the probability of theft by
3 contractors increasing, which can lead to the facility's closure and subsequent disruption of activities. Economic Second, Hanscom’s importance is elucidated by the economic impact of an attack. As a key employer, the base contributes at least $6.4 billion to the national economy (Kalb, 2021). Therefore, a terrorist attack on the facility will lead to numerous losses and disruptions, especially in the aviation sector. Likewise, an attack might undermine the facility's operations, with equipment worth $1.2 billion being damaged. This can contribute to below-par performance in the military aspect, as the base is responsible for sharing information through the C3I&N system. Public Confidence Furthermore, Hansom Air Force Base enjoys a long-standing relationship with the public. The latter rely on it for security and employment, with its location minimizing the probability of incursions. Au contraire, it is likely to report a damaged brand image and reputation if the Taliban launches an attack against it. The community and general public will perceive it as a viable target and threat. Therefore, public sentiment will shift against the Air Force base, thus undermining its relationship with the locals. Government Capability Finally, the facility is reverred and important due to its C3I&N system, which enhances government capabilities. The system is responsible for collecting and doling out intelligence information vital for domestic and international security. The occurrence of an attack on the asset
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 can contribute to breaches and decreased efficiency. Other than the C3I&N system, Hanscom oversees the maintenance of transportation activities at Boston Logan International. Any disruptive activities will lead to the diversion of planes and loss of revenue [ CITATION USD202 \l 1033 ]. The local government relies on the base for support with its ill-equipped nature, creating concerns about security management. The local elected officials in the communities around the base include the mayor and house representatives. The officials provide manpower and financial resources that can help manage an attack. Likely Attack Scenario The likely attack scenario will involve a host of factors, with the topmost being a cybersecurity and insider attack. The former entails the Taliban launching a ransomware which will cripple the C3I&N system. Thereafter, they will lock down communication between the base and other law enforcement agencies. Any recruits within the facility will engage in espionage, where they collect, edit, or delete critical information pertaining to its operations. The collected data will then be sold to national enemies, including Russia, with the terrorist cell also holding some of it for future attacks. Without communication, Hanscom will face the threat of a physical attack, with the insurgents making their way into the facilities. They will use guns to maim or kill the employees, thus leading to closure and disruptions. A. Level of Damage Suffice it to say that the level of damage will be high. First, the base will lose its operational efficiency due to a cybersecurity attack. It will be forced to close down its systems in order to protect confidential data, as shown in the case of JBS Foods. Likewise, the insider threat will contribute to a decline in public confidence and government capability. The community will
5 become wary of the base's operations, thus undermining its reputation and brand image. Furthermore, the physical attack will contribute to the deaths of 150 people while another 3,500 are injured. While high, the numbers are similar to the ones reported in the recent Capitol incursion, where at least 140 people were injured. B. Severity of Adverse Effects The severity calculations reveal that the level of consequence is moderate considering the impact on the government's capabilities, public confidence, and human and economic aspects. These calculations were derived using a formula that multiplies the consequence by vulnerability and threat. A score of 288 was derived from the formula as shown below: T=6 V=6 C=8 =6*6*8 =288 V. Countermeasures Hanscom's leadership must implement countermeasures to mitigate the terrorist threat. It is critical that the leadership use contemporary technology in order to increase the base's security posture across three key areas including physical, cyber, and personnel security. A. Recommend Countermeasures i. Physical Security
6 Hanscom Air Force Base will also resort to low-tech elements, including deployable barriers that rise into position during an attack. The barriers can be rapidly set up on asphalt or concrete roads to manage the flow of cars or individuals. Specifically, the base will use Delta's portable barriers to secure its key facilities[ CITATION Del231 \l 1033 ]. The permanent steel bollards will be installed at the gate where the necessary checks are conducted. The MP5000 and DSC1000 barriers from Delta will be purchased and placed across the base. Likewise, the base will mitigate the physical security vulnerabilities through mechanical and electrical turnstiles. The turnstiles are part of the control system, which will detect and deter unauthorized entries. The base will ensure that each door has a card or biometric reader that offers access only to authorized parties [ CITATION Bri18 \l 1033 ]. Specifically, it will utilize the latest technology, like optical turnstiles that rely on electronic beams and visual interfaces when managing entry. Figure 1: Turnstines
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 Source: AIS Technology (2023) ii. Cybersecurity Hanscom Air Force Base relies on the PEO C3I&N, which is susceptible to various threats that can impact operational efficiency. In order to protect this critical infrastructure, the organization must implement access control systems. These systems are automated and manage access to the controlled area or system. Specifically, the top brass will implement the Mandatory Access Control, wherein the leaders have control over settings[ CITATION Bar231 \l 1033 ]. The administrators will determine which parties have privileges while evaluating the nature of their operations in the system. The MAC model will be complemented by Role-Based Access Control, which assigns permissions to key members in the air base. The network access will be limited based on the individual roles and responsibilities within the firm. The government facility can use SecureLink, which is the latest product in the industry that controls devices and user access to the C3I&N. iii. Personnel Security The best-fit countermeasure is security patrols, considering the base's sensitive nature. The management will create a staffing plan to ensure continuous patrols during the day and night[ CITATION Uni12 \l 1033 ]. The latest trends in patrols involve using dogs that help detect any intrusion or explosive residues. Subsequently, a security awareness program will be used to apprise the staff of Hanscom’s vulnerabilities. The program will be conducted using the latest technologies, like video calls, to address the individual and geographical needs of staff members. It will play a key role in distributing responsibility and enhancing concerted efforts towards securing the base.
8 B. Deter Terrorist Threats The deployable barriers and turnstiles will force the actors to rethink attacking the base. The two work together to manage inflow and outflow, thus prompting alternative measures. They will deter potential threats by minimizing access to the physical facilities. Also, the organization will utilize Natural Surveillance CIPD strategies to keep intruders under observation. This strategy relies on design features that enhance the key facility’s visibility [ CITATION Cit17 \l 1033 ] . The security personnel will be able to observe users and intruders while challenging inappropriate behavior and reporting it to law enforcement. The technique will deter the behavior of Taliban insurgents and insiders by increasing awareness that they are being watched. Figure 2: Deployable Barriers Source: [ CITATION Del231 \l 1033 ] The natural surveillance also includes setting up physical features and activities that maximize visibility in a bid to decrease target opportunities. For instance, the base will ensure
9 adequate illuminatin of public areas through the use of automated rifle series street lights. These lights are the net generation which utilize high-efficiency LED Lamp Beads combined with artificial intelligence. The doors and windows will be designed to look into the parking lot and other public areas while reducing any obstructions preventing visibility. An example is shown in figure 2 below: Figure 3: Rifle Street lights Source: ZGSM-China (2023)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 Likewise, the MAC and RABC control will minimize insider threats and ransomware. They will regulate access to information based on personnel privileges. This will deter any potential threat emanating from espionage. Figure 4: Role-Based Access Control Source: Hoffman (2023) The final countermeasure involves security patrols and awareness programs. The two are vital in deterring attacks by ensuring that the personnel actively monitor the facility and its environs. The awareness program will enhance awareness of Hanscom's vulnerability, thus tasking personnel with securing the critical assets. This plays a major role in minimizing insider threats. Figure 5: Security Patrols
11 Source: [ CITATION Oli20 \l 1033 ] References AIS Technology. (2023). Gates and Turnstiles. https://aistechnology.mt/gates-and-turnstiles/ U.S. Department of State Bureau of Counterterrorism. (2020). Annex of Statistical Information Country Reports on Terrorism 2019. Development Services Group, Inc. Bennett, B. (2018). Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel. Wiley. City of Virginia Beach. (2017). Crime Prevention Through Environmental Design. City of Virginia Beach. Data USA. (2023). HANSCOM AFB, MA . Retrieved from Data USA: https://datausa.io/profile/geo/hanscom-afb-ma#:~:text=Hanscom%20AFB%2C%20MA %20is%20home,any%20other%20race%20or%20ethnicity. Delta Scientific Corporation. (2023). Portable Barriers . Retrieved from Delta Scientific Corporation: https://deltascientific.com/high-security/portable-barriers/ Grooms, O. (2020, July 16). Military Working Dogs handlers stick together . Retrieved from AFCENT: https://www.afcent.af.mil/Units/379th-Air-Expeditionary- Wing/News/Display/Article/2276360/military-working-dogs-handlers-stick-together/
12 Hanscom Air Force Base. (2023). About Us . Retrieved from Hanscom: https://www.hanscom.af.mil/ Hoffman, B. (2023). Access Control: Models and Methods . Retrieved from Delinea: https://delinea.com/blog/access-control-models-methods#:~:text=There%20are%20four %20types%20of,RBAC%20or%20RB%2DRBAC). Kalb, G. (2021). Bedford Explained. Retrieved from The Bedford Citizen: https://thebedfordcitizen.org/2021/06/bedford-explained-hanscom United States. Department of Homeland Security. (2012). Buildings and Infrastructure Protection Series: Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings. ZGSM-China (2023). Different types of street lights and their applications. https://www.zgsm- china.com/blog/different-types-of-street-lights-and-their-applications.html#:~:text=The %20rifle%20series%20street%20light,control%20systems%20in%20the%20future.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help