StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Critical Infrastructure Identification - Research Paper Example

Cite this document
Summary
From the paper "Critical Infrastructure Identification" it is clear that generally speaking, in the NYC area the top three infrastructures to guard and protect are emergency services, the communication infrastructure, and power and utility infrastructure…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Critical Infrastructure Identification
Read Text Preview

Extract of sample "Critical Infrastructure Identification"

? Critical Infrastructure Identification According to Moteff and a Parfomak (2004) the meaning of critical infrastructure in the public policy context has evolved overtime and is still open to debate. In the 1980’s it was primarily defined in relation to public works but this definition was reconsidered and now reflects the increasing importance of homeland security. The American Heritage Dictionary (qtd. in Moteff and Parfomak 2004) defines infrastructure as: The basic facilities, services, and installations that are required for the community and society to function. These include transportation, communication systems; water and power lines as well as public institutions which includes schools, post offices and prisons. The infrastructures that are most critical to protect in New York City (NYC) are the transport infrastructure (including the major bridges and highways), the medical infrastructure, the communication infrastructure, the fire and safety infrastructure, the power, water and other utilities infrastructure, prisons, high occupancy buildings, national monuments and schools. These are essential in any defense or natural disaster mitigation operations and the necessary steps should be taken to ensure that they are protected from terrorist attacks. The increasing threat of international terrorism has resulted in a renewal of the federal government’s interest in issues related to infrastructure. The focus has changed from the adequacy of infrastructure to the protection of infrastructure. One of the problems seems to relate to the identification of critical infrastructure. This has been very important especially in the NYC area which was the scene of the most devastating terrorist attack on September 11, 2001. The act defines critical infrastructure as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters” (Moteff and Parfomak, 2004) Description and Analysis of Best Practice Used In Critical Infrastructure Identification The Department of Homeland Security (DHS) has drafted a list of key assets. No real basis was established to determine what is key and so the departments’ listings are often somewhat different. An assets criticality depends on the assets operational or business value and is also a function of both time and situation. The value of the critical infrastructure in New York City (NYC) relates to the key operations military and otherwise that depend on these assets and how these dependencies change over time. It also depends on the sensitivity of the City’s operations and services to the loss of the asset. That means if the asset is affected by any natural disasters or other acts of terrorism, the maximum time for which it can be out of use before it results in serious implications for the normal operations of the City. It also depends on whether asset restoration or other backup measures can occur within the time allocated as the asset’s maximum allowable down time. These critical assets will include assets that require special protection because of their potential for destruction and or the value that they provide for the City. They may include symbols and icons that represent the heritage of the nation. The concept surrounding their identification is a means by which the government can place emphasis on high priority assets in its critical infrastructure protection program. All the federal departments and agencies have been given the task of identifying their critical infrastructure. The heads of these departments and agencies report to the Secretary on an annual basis on their efforts to identify; prioritize and coordinate the protection of critical infrastructure and key resources in their respective sectors (DHS, 2008). The DHS and sector-specific agencies collaborate with the private sector which owns and operates most of the critical infrastructures and assets in identifying, prioritizing and coordinating the protection of critical infrastructure and key resources. This is in addition to other collaborative efforts as outlined by the DHS. The fact that each federal department and agency identifies their own critical infrastructure is important they are more familiar with their area of operation. They know what infrastructure or assets are critical to their operation. This helps to make the process of identification smoother and less time consuming. This recognizes the fact that each sector has its own unique characteristics and operating models (FAS, 2003). Description and analysis of the tools and techniques used to identify critical infrastructure There are no set tools or techniques that are used to identify critical infrastructure. The technique adopted may be different for the various departments but it essentially involves prioritizing infrastructure or assets according to their importance. This involves an assessment of losses and other negative repercussions if specific infrastructure or assets are affected in any way. The greater the loss that would be suffered, the more critical the asset would be. An established standard would be much more effective as there would be clear priorities in terms of what makes an infrastructure critical. However, the definition given can suffice in some situations. Summary of the critical infrastructure identification process The critical infrastructure identification process is carried out by the heads of the federal department and agencies. They decide what is critical for their departments based on the definition presented in the act. They DHS also collaborate with the private sector which also determines their key infrastructure. Based on the list that is generated a report is presented to the Secretary on an annual basis. It lists the critical infrastructure for each sector and indicates to the DHS the infrastructure or assets they should protect. Each sector determines what they consider to be high priority assets. High priority assets are assets with a credible potential for loss of life and loss of citizen confidence. These are assets for which the impact would be felt nationally if they are lost. They are assets that the nation cannot afford to lose. Based on their knowledge and expertise the DHS will also determine the priority which will be given to these assets and so determine the level of protection that may be required. An Explanation of How National Preparedness and Homeland Security Directives Affect Critical Infrastructure Assessment Homeland Security directives are produced as necessary by the DHS. They indicate the need to ensure that critical infrastructures, key assets and resources are identified and protected. They Secretary seeks to obtain the necessary information so that the DHS is able to plan an effective strategy that is aimed at the protection of critical infrastructure. The critical infrastructure assessment aims to determine whether the security systems in place as they relate to the protection of critical infrastructure and key assets are resilient to be able to withstand threats including acts of terrorism, cyber attacks, pandemics and catastrophic natural disasters (DHS, 2011). This will help them to keep track of the progress of their ability to build and improve the capacity of the nation to withstand these events. The Top Three Infrastructures In The NYC Area To Guard and Protect In the NYC area the top three infrastructures to guard and protect are emergency services, the communication infrastructure, and power and utilities infrastructure. Emergency services include medical, police, fire and rescue services. These are some of the most essential services and are very important to the health and safety of the citizens of any area whether it be NYC or otherwise. Some form of emergency service is normally required in any disaster, whether it is natural or man made which include terrorist attacks. These services will help people and protect them from further inconveniences resulting from the issue that triggered the emergency. Communication is very important. In order to access emergency services in a disaster people have to be able to communicate with each other and to get help from the police, the fire department or medical services. If they are not able to communicate then emergency services will not be able to respond to their needs or get the critical information they need to carry out their work effectively. Communication is very important to the City’s survival and needs to be up and running in the shortest possible time to facilitate effective and efficient rescue operations. Communication can prevent further terrorist attacks as well as help people to prepare for tragedies which may be easily prevented by the transmission of information. It is also important for people to be informed on when it is safe to venture into certain areas where events have occurred. They also need to be informed of when things are back to normal. The events after the terrorist attacks in NYC on September 11, 2001 indicates how important the telecommunication infrastructure is and how it may be affected in times of disaster. Power and utilities are very important since it provides energy is important for the operations of all vital industries and sectors. It is therefore important that it be protected at the highest level. References DHS. (2003), Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection. Retrieved from: http://www.dhs.gov/xabout/laws/gc_1214597989952.shtm FAS (2003) Homeland Security Presidential Directive / HSPD-7: Critical Infrastructure Identification, Prioritization, and Protection. Retrieved from: http://www.fas.org/irp/offdocs/nspd/hspd-7.html Moteff, J. and Parfomak, P. (2004), Critical Infrastructure and Key Assets: Definition and Identification. Resources, Science, and Industry Division. The Library of Congress: Congressional Research Service DHS (2011) Presidential Policy Directive / PPD-8: National Preparedness. retrieved from: http://www.dhs.gov/xabout/laws/gc_1215444247124.shtm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Critical Infrastructure Identification Research Paper”, n.d.)
Retrieved from https://studentshare.org/nursing/1423920-critical-infrastructure-identification
(Critical Infrastructure Identification Research Paper)
https://studentshare.org/nursing/1423920-critical-infrastructure-identification.
“Critical Infrastructure Identification Research Paper”, n.d. https://studentshare.org/nursing/1423920-critical-infrastructure-identification.
  • Cited: 0 times

CHECK THESE SAMPLES OF Critical Infrastructure Identification

Infrastructure Security of Agricultural and Food

In order to serve the nation well, the sector needs to be effectively associated and dependent on other sectors that include water, transportation, energy, banking and finance, chemical, and dams (Food and Agriculture Sector: critical infrastructure, 2012).... “Indeed, in terms of accurate threat assessments, response structures and preparedness initiatives, the sector continues to exist as a glaring exception to the wide-ranging emphasis that has been given to critical infrastructure protection in this country” (Chalk, 2001, p....
4 Pages (1000 words) Research Paper

The Purpose of Safety and Security for Preparedness and Prevention

identification of assets could be done on the basis of prioritizing the organizational structures and belongings.... Terrorist events are critical to the country's infrastructure and thus vulnerability of such events could be varied.... hellip; The security model accentuates the need for the development of the connection between the strategies and guiding principles to make the circumstances of terrorists attack to be countered with the safety of organizational infrastructure....
9 Pages (2250 words) Essay

Terrorist Threats and Counterterrorism Response to a Terrorist Attack

For instance, it has ensured Critical Infrastructure Identification, prioritization and protection from terrorist attacks.... (2007) Understanding, Assessing, and Responding to Terrorism: Protecting critical infrastructure and Personnel.... The United States Perspectives on Terrorist Threats and Counterterrorism Since September 11, 2001 and How the Techniques and Strategies Employed After Attack Have Remained Consistent and How They Have Changed The United States' perspective on terrorist threats and… Since this time, advancement of counterterrorism in he U....
2 Pages (500 words) Essay

Hardware Infrastructure in Any Big Business or Federal Organization

Determine the challenges of changing old/Obsolete Information Technology hardware infrastructure Project Objective: The project's objective involves the identification of several needs and difficulties encountered during the process of managing information and Technology infrastructure basing on several factors.... The paper "Hardware infrastructure in Any Big Business or Federal Organization" investigates several needs encountered during the process of managing information and Technology infrastructure basing on several factors....
6 Pages (1500 words) Research Paper

A Response to a Potential Terrorist Attack on Critical Infrastructures and Key Assets

This case study "A Response to a Potential Terrorist Attack on critical Infrastructures and Key Assets" is presenting a plan to work with private and public stakeholders to prepare for, respond to, and recover from a potential terrorist attack on critical infrastructures and key assets.... The success of the plan is measured in terms of public and private sectors' awareness of the availability and accessibility to critical response scenarios in safeguarding the identified critical infrastructures....
6 Pages (1500 words) Case Study

Communications Best Practices When Identifying Critical Infrastructures

This paper "Communications Best Practices When Identifying Critical Infrastructures" focuses on the fact that characteristics of a communication system that takes communication infrastructure into consideration must bear demonstrate preparedness to handle a range of communication emergencies.... The best connectivity infrastructure must be flanked by the general outline of the systems used in a region.... Using the CARVER matrix in the infrastructure level of safety assurance, it is possible for emergency handling systems to avert various deficiencies....
3 Pages (750 words) Research Paper

Corporate Digital Forensic Investigations

The Impact of Cloud Computing on Digital Forensic Investigations Digital forensic is defined as the process of identification, collection, and analysis of data that encompasses the preservation of the integrity of information and maintenance of the chain of custody of the data (Al-Sadi 21).... Organizations can access resources on the web without the need for physical infrastructure.... Cloud computing offers great benefits to organizations because they do not have to invest in technological infrastructures such as the purchase of software, hardware, and network infrastructures to support critical business applications....
6 Pages (1500 words) Essay

Infrastructure Projects Undertaken in Dubai

This report "infrastructure Projects Undertaken in Dubai" discusses Dubai and the whole of the UAE region that has in place different criteria for assessing the projects in the country, this helps in mitigation of potential involved risks, this region has a first growing infrastructural base.... Long term use of sustainable infrastructure is likely to reduce the various risks that are associated with certain utilities.... It has led to a rise in expectations among citizens in the area concerning transparency and good governance levels, quality of services offered to the public as well as modern infrastructure....
17 Pages (4250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us