week 4 assignment
docx
keyboard_arrow_up
School
Strayer University, Memphis *
*We aren’t endorsed by this school
Course
402
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by lajuain38670
Week 4 Assignment - National Infrastructure Protection Plan (NIPP)
Lorenzo Windless
Strayer University
Homeland Security Organization and Administration
Alanna Gordon
4/26/2023
Analysis of NIPP and Risk Management Framework
To secure the country's most essential resources and facilities from potential threats, the
government developed the National Infrastructure Protection Plan (NIPP). This project aims to
improve emergency readiness, response time, and the speed with which resources and
infrastructure can be accessed. An integrated national CIKR protection program results from
these many separate protection and resilience efforts. All public and private resources and
infrastructure required for security in each region are included in the plan. NIPP initially uses the
risk management framework to plan the threat-risk management framework, which entails
categorizing and ranking threats. The strategy considers CIKR's potential issues, risks, and
effects. The efficacy of a method for avoiding or lessening the impact of a threat is determined
via trial and error. This feeds into an iterative process wherein risk management is continuously
improved. CIKR Protection Partners, such as the DHS and Sector-specific Agencies, must
implement the risk management strategy (SSA). Its goal is to protect the ICCR by considering
any and all threats that might affect this nation. The Department of Homeland Security, among
others, constantly assesses potential risks to the nation's critical infrastructure and resources and
works to eliminate them. Partners in CIKR protection also prepare for repercussions that might
result in the vulnerability being exploited. The partners have initiatives to mitigate risks and
control outcomes associated with rapid CIKR revival.
Purpose of the Feedback Loop Design
The feedback loop is essential for the ongoing development of NIPP techniques. The
framework uses several measures to calculate the NIPP's efficacy, such as the number of targeted
sectors, the prevalence of CIKR protection strategies, and the evolution of risks and hazards.
Gather as much data as possible on the current program and make necessary improvements to
ensure the CIKR is as safe as feasible. Constant feedback will help the framework mature,
boosting the NIPP's overall effectiveness.
The CIKR is protected, and the NIPP is increased via feedback. A feedback loop is
included to address evolving dangers with novel approaches. In conclusion, advances in
weaponry enable terrorists to amass larger arsenals. Because of recent developments in medicine,
the likelihood of bioterrorism has increased dramatically in recent decades (Alcaraz & Zeadally,
2015). The increasing threat necessitates improved NIPP strategies from CIKR. If you want to
know whether your plan is working, you need to take two measurements at different times and
compare the results. This creates a cyclical feedback effect. Because of the feedback loop, the
NIPP risk management system may be improved at any level.
Taking a "Risk Management" Approach
The term "risk" is used to describe the potential negative outcome of an event. Only by
comparing the chance of an event's occurrence with that of other circumstances with known
probabilities can its occurrence be predicted. Risk-informed decisions are made possible by the
risk management strategy, which takes into account and evaluates threats to the CIKR's most
important assets. Due to the inevitable occurrence of accidents and events, it is essential to
develop a risk management strategy to maintain CIKR. The Department of Homeland Security is
in charge of developing, implementing, and coordinating national security plans. They may
consider all potential negative consequences related to such risks (Atlas, 2013), as they worry
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
about anything from threats to their business brand to logistical difficulties. Everyone in the
group is kept up to date and allowed to prepare ahead of time, with the anticipated costs of
prevention, containment, and neutralization of the identified dangers.
The NIPP may also be adjusted as necessary in light of evolving circumstances. We shall
evaluate the NIPP's success when it has been put into action. The risk management plan
considers not just the uncertainties but also the potential negative consequences. Previous threats
to the nation, and the country's weaknesses, have changed. The risk management of NIPP, which
employs the NIPP via the risk management framework, is essential for the ongoing development
of NIPP. The DHS plays a crucial role in this approach, which assesses the threat to CIKR
security presented by different threats and then prioritizes those concerns.
Most Important Step - Evaluation of Hazards
In the process of managing risks, assessing potential hazards is the most crucial step. Risk
management involves identifying, evaluating, and controlling possible adverse events. The NIPP
will be ineffective against threats, leaving the CIKR in danger, if the risk assessment needs to be
more accurate. However, the DHS must always be on the lookout for new hazards. The world's
top security agencies must prepare for dangers they can't yet name.
Risk-informed decisions take into account potential threats, weaknesses, and outcomes.
Future crises or events, and the choices taken in response to them, threaten the CIKR. Negative
outcomes for CIKR might be the result of dangerous decisions based on inaccurate risk
assessments. Assessing the dangers helps decide how much money and workforce should be
spent on protection. The need for risk assessment should be similarly emphasized with respect to
CIKR.
Effectiveness of the NIPP
The software considers the possibility that all possible dangers have been considered.
Risk assessment is used as a central part of the design process for the NIPP Risks Management
Framework. With this information in hand, the CIKR has devised steps to mitigate the threats it
confronts. Prioritization of scarce resources is achieved by weighing existing projects' risks and
benefits against proposed new ones. Plans made in advance but have yet to be implemented
during an event may help accomplish their goals. All the apps the framework will deploy should
be considered to have potential vulnerabilities. When the current NIPP is deemed insufficient,
federal employees from different agencies should be given the authority to act independently in
the face of an unexpected threat.
New vulnerabilities may be uncovered during the CIKR risk assessment. When it comes
to analyzing CIKR risk, the federal government and other agencies like the DHS employ a
variety of models to come up with actions including risk reduction, threat protection, and the
management of potentially unintended effects. When doing a risk analysis, the data gathered may
reveal previously unknown weaknesses that potential dangers might exploit. Threat actors, such
as terrorists, may be able to find and use holes in the CIKR (Shull, Dietz, & Kenley, 2016). The
CIKR is safeguarded by the information included in the NIPP. Consequently, a risk assessment
and its associated findings should be treated as highly confidential.
References
Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and
challenges for the 21st century.
International journal of critical infrastructure
protection
,
8
, 53-66.
Atlas, R. I. (2013).
21st century security and CPTED: Designing for critical infrastructure
protection and crime prevention
. CRC Press.
Shull, C., Dietz, J. E., & Kenley, C. R. (2016). CRITICAL INFRASTRUCTURE PROTECTION
AND RECOVERY: A Common Recovery Model for Grid Systems in Blackout
Scenarios.
INSIGHT
,
19
(4), 47-49.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help