week 4 assignment

docx

School

Strayer University, Memphis *

*We aren’t endorsed by this school

Course

402

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by lajuain38670

Report
Week 4 Assignment - National Infrastructure Protection Plan (NIPP) Lorenzo Windless Strayer University Homeland Security Organization and Administration Alanna Gordon 4/26/2023
Analysis of NIPP and Risk Management Framework To secure the country's most essential resources and facilities from potential threats, the government developed the National Infrastructure Protection Plan (NIPP). This project aims to improve emergency readiness, response time, and the speed with which resources and infrastructure can be accessed. An integrated national CIKR protection program results from these many separate protection and resilience efforts. All public and private resources and infrastructure required for security in each region are included in the plan. NIPP initially uses the risk management framework to plan the threat-risk management framework, which entails categorizing and ranking threats. The strategy considers CIKR's potential issues, risks, and effects. The efficacy of a method for avoiding or lessening the impact of a threat is determined via trial and error. This feeds into an iterative process wherein risk management is continuously improved. CIKR Protection Partners, such as the DHS and Sector-specific Agencies, must implement the risk management strategy (SSA). Its goal is to protect the ICCR by considering any and all threats that might affect this nation. The Department of Homeland Security, among others, constantly assesses potential risks to the nation's critical infrastructure and resources and works to eliminate them. Partners in CIKR protection also prepare for repercussions that might result in the vulnerability being exploited. The partners have initiatives to mitigate risks and control outcomes associated with rapid CIKR revival. Purpose of the Feedback Loop Design
The feedback loop is essential for the ongoing development of NIPP techniques. The framework uses several measures to calculate the NIPP's efficacy, such as the number of targeted sectors, the prevalence of CIKR protection strategies, and the evolution of risks and hazards. Gather as much data as possible on the current program and make necessary improvements to ensure the CIKR is as safe as feasible. Constant feedback will help the framework mature, boosting the NIPP's overall effectiveness. The CIKR is protected, and the NIPP is increased via feedback. A feedback loop is included to address evolving dangers with novel approaches. In conclusion, advances in weaponry enable terrorists to amass larger arsenals. Because of recent developments in medicine, the likelihood of bioterrorism has increased dramatically in recent decades (Alcaraz & Zeadally, 2015). The increasing threat necessitates improved NIPP strategies from CIKR. If you want to know whether your plan is working, you need to take two measurements at different times and compare the results. This creates a cyclical feedback effect. Because of the feedback loop, the NIPP risk management system may be improved at any level. Taking a "Risk Management" Approach The term "risk" is used to describe the potential negative outcome of an event. Only by comparing the chance of an event's occurrence with that of other circumstances with known probabilities can its occurrence be predicted. Risk-informed decisions are made possible by the risk management strategy, which takes into account and evaluates threats to the CIKR's most important assets. Due to the inevitable occurrence of accidents and events, it is essential to develop a risk management strategy to maintain CIKR. The Department of Homeland Security is in charge of developing, implementing, and coordinating national security plans. They may consider all potential negative consequences related to such risks (Atlas, 2013), as they worry
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
about anything from threats to their business brand to logistical difficulties. Everyone in the group is kept up to date and allowed to prepare ahead of time, with the anticipated costs of prevention, containment, and neutralization of the identified dangers. The NIPP may also be adjusted as necessary in light of evolving circumstances. We shall evaluate the NIPP's success when it has been put into action. The risk management plan considers not just the uncertainties but also the potential negative consequences. Previous threats to the nation, and the country's weaknesses, have changed. The risk management of NIPP, which employs the NIPP via the risk management framework, is essential for the ongoing development of NIPP. The DHS plays a crucial role in this approach, which assesses the threat to CIKR security presented by different threats and then prioritizes those concerns. Most Important Step - Evaluation of Hazards In the process of managing risks, assessing potential hazards is the most crucial step. Risk management involves identifying, evaluating, and controlling possible adverse events. The NIPP will be ineffective against threats, leaving the CIKR in danger, if the risk assessment needs to be more accurate. However, the DHS must always be on the lookout for new hazards. The world's top security agencies must prepare for dangers they can't yet name. Risk-informed decisions take into account potential threats, weaknesses, and outcomes. Future crises or events, and the choices taken in response to them, threaten the CIKR. Negative outcomes for CIKR might be the result of dangerous decisions based on inaccurate risk assessments. Assessing the dangers helps decide how much money and workforce should be spent on protection. The need for risk assessment should be similarly emphasized with respect to CIKR.
Effectiveness of the NIPP The software considers the possibility that all possible dangers have been considered. Risk assessment is used as a central part of the design process for the NIPP Risks Management Framework. With this information in hand, the CIKR has devised steps to mitigate the threats it confronts. Prioritization of scarce resources is achieved by weighing existing projects' risks and benefits against proposed new ones. Plans made in advance but have yet to be implemented during an event may help accomplish their goals. All the apps the framework will deploy should be considered to have potential vulnerabilities. When the current NIPP is deemed insufficient, federal employees from different agencies should be given the authority to act independently in the face of an unexpected threat. New vulnerabilities may be uncovered during the CIKR risk assessment. When it comes to analyzing CIKR risk, the federal government and other agencies like the DHS employ a variety of models to come up with actions including risk reduction, threat protection, and the management of potentially unintended effects. When doing a risk analysis, the data gathered may reveal previously unknown weaknesses that potential dangers might exploit. Threat actors, such as terrorists, may be able to find and use holes in the CIKR (Shull, Dietz, & Kenley, 2016). The CIKR is safeguarded by the information included in the NIPP. Consequently, a risk assessment and its associated findings should be treated as highly confidential. References Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and challenges for the 21st century. International journal of critical infrastructure protection , 8 , 53-66.
Atlas, R. I. (2013). 21st century security and CPTED: Designing for critical infrastructure protection and crime prevention . CRC Press. Shull, C., Dietz, J. E., & Kenley, C. R. (2016). CRITICAL INFRASTRUCTURE PROTECTION AND RECOVERY: A Common Recovery Model for Grid Systems in Blackout Scenarios. INSIGHT , 19 (4), 47-49.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help