Critical infrastructure refers to the systems and assets that are essential to the functioning of a society, such as transportation networks, communication systems, and power grids. These systems are vital to the well-being and security of a society, and their disruption or destruction can have serious consequences. Because of this, it is important to identify and address vulnerabilities in critical infrastructure, as well as to implement measures to protect these systems from threats.
There are many different types of threats that can pose a risk to critical infrastructure. These can include natural disasters, such as earthquakes and hurricanes, as well as man-made threats, such as cyber attacks and terrorism.
One way to protect critical infrastructure is through the use of physical security measures, such as perimeter fencing and security personnel. These measures can help to deter potential threats and make it more difficult for unauthorized individuals to access critical infrastructure.
Another important aspect of protecting critical infrastructure is ensuring that these systems are resilient and able to withstand potential threats. This can involve things like designing infrastructure to be able to withstand natural disasters, or implementing redundant systems that can take over in the event of a failure.
In addition to physical security measures and system resilience, it is also important to have robust plans in place for responding to and recovering from disruptions to critical infrastructure. This can include things like emergency response plans and backup power systems.
Protecting critical infrastructure is a critical responsibility, as these systems are essential to the functioning of society. By identifying vulnerabilities and implementing measures to address them, we can help to ensure the security and resilience of our critical infrastructure.
MODULE #1 CASE STUDY (Critical Infrastructure Vulnerability and Protection: An Introduction)
You will be referring to the required readings, videos, and websites to address the assignments. Additionally, you can also research other professional sources available on the internet.
NOTE: This research paper should have an Introduction and a conclusion. The first paragraph should tell the reader what the research will show, “This research will show______________ .”
What was your conclusion? What are best practices based on your research?
1) From the NIPP of 2013, what is meant by “Partnership Structure?” Give an example.
2) Choose one of the 16 Critical Infrastructure Sectors and comment on its Sector Specific Plan. What other sectors is it closely linked to? Why? How?
3) Explain SCADA. Why is SCADA a popular target for terrorists? Explain and use quotations to support your statements.
Organization: Subheadings should be used to organize your paper according to question.
At least two references should be included from academic sources (e.g., peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking).
MODULE #1 BACKGROUND Required Readings, Websites, & Videos
Critical Infrastructure Vulnerability and Protection: An Introduction
Though you may find some of your readings technical, you are not responsible for detailed knowledge, formulas, or other scientifically oriented material. The expectation is that you have a general working knowledge of the material.
InfraGard factsheet. (2018). FBI: Office of Private Sector. Retrieved from https://www.infragard.org/Files/INFRAGARD_Factsheet_10-10-2018.pdf
Krambeck, D. (2015). An introduction to SCADA systems. All About Circuits. Retrieved from https://www.allaboutcircuits.com/technical-articles/an-introduction-to-scada-systems/
Mandel, M., & McCormick, E. (2018). FERC approves supply chain risk reliability standards. Troutman Sanders. Retrieved from https://www.troutmansandersenergyreport.com/2018/10/ferc-approves-supply-chain-risk-reliability-standards/
NIPP 2013: Partnering for infrastructure security and resilience. (2013). DHS.gov. retrieved from https://www.cisa.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdf Read pages 1-14
Resiliency rules: 7 Steps for critical infrastructure protection. (2007). Slideserve. Retrieved from https://www.slideserve.com/sierra/resiliency-rules
The National Counterintelligence and Security Center. Insider threat mitigation for U.S. critical infrastructure entities: Guidelines from an intelligence perspective (2021, March). https://www.dni.gov/files/NCSC/documents/nittf/20210319-Insider-Threat-Mitigation-for-US-Critical-Infrastru-March-2021.pdf. Read “Nine Elements of Insider Threat Programs.” pp. 12-17.
Critical Infrastructure Sectors. https://www.dhs.gov/cisa/critical-infrastructure-sectors
Information Sharing: A Vital Resource for Critical Infrastructure Security and Resilience. https://www.dhs.gov/cisa/information-sharing-vital-resource
National Infrastructure Protection Plan. https://www.dhs.gov/cisa/national-infrastructure-protection-plan
Lavendaire, A. (2019, August 28). Time management tips: How to prioritize and be more productive. Retrieved from https://www.youtube.com/watch?v=vDE8YzogGUI&ab_channel=Lavendaire
TV6 & FOX UP. (2017, August 9). InfraGard [Video file]. Retrieved from https://www.youtube.com/watch?v=CagICITyiJs
RealPars. (2019, June 3). What is SCADA? [Video file]. Retrieved from https://www.youtube.com/watch?v=nlFM1q9QPJw
This is an 8-minute video