logo

Domestic Infrastructure Protection Plan and Functions

   

Added on  2022-08-18

6 Pages1227 Words249 Views
RUNNING HEAD: CRIMINAL LAW 0
Terrorism, insider threats, and
homeland security
March 8
2020
Domestic Infrastructure Protection Plan and Functions_1
CRIMINAL LAW 1
Introduction
Terrorism is the unlawful use of violence and intimidation. Threatening civilians, scaring
them with unlawful activities is considered as terrorism (Whittaker, 2012). This report will
highlight the importance of protecting the community or nation. This report is an in-depth
analysis of the domestic infrastructure protection plan and functions of a countrywide
infrastructure protection plan. Terrorism activities can also be performed in the form of cyber-
crimes and data stealing. This report will suggest how companies or the organization can protect
their sensitive information from getting leaked to terrorists. Further, this report will be analyzing
how the US is dealing with the prevention of terrorism.
Infrastructure protection plan
It is necessary to protect the community of the critical infrastructure and key resources
(CKIR) of the US for the country's safety, community wellbeing and protection, and monetary
strength. CKIR includes bodily or virtual assets, systems, and networks that would have an
incapacitating impression on security, people's health or safety, and national economic security.
The national infrastructure protection plan (NIPP) offers synchronized process that is used to
create national significances, areas, and necessities for serious infrastructure and key resource
protection. Federal means are useful in an effective manner to reduce helplessness, determine
intimidations, and diminish the concerns of attacks and other occurrences. This plan identifies
the bodily, cyber, and human reflections required for the effective application of defensive
programs and resiliency strategies. The main feature of a NIPP is to manage the risk. It sets forth
an inclusive risk administration framework and clearly defines the roles and duties for the
department of the nation's security, federal sector-specific agencies, and other tribal, territorial,
and private sector partners. This plan establishes the process for combining significances,
vulnerability, and threat information to produce a systematic and rational assessment of national
or sector risk.
National infrastructure protection plan: risk Management Outline
NIPP involves physical, cyber, and human risk controlling. This plan always tries to advance
the protection of CIKR. There is a cycle on which a NIPP manages the risk (Lewis, 2019).
Domestic Infrastructure Protection Plan and Functions_2
CRIMINAL LAW 2
Set goals and objectives: the chief step is to set a goal or objectives so that all the
resource allocation and planning can take place for better results in the end.
Recognise assets, systems, and networks: once goals or objectives are decided it is
essential to identify the assets, systems, and networks available for use.
Assess risks: it is essential to assess the risk as well for the better and safe future. It is
essential to identify the consequences, vulnerability, and threats in the nation.
Prioritize: after concluding the above steps national infrastructure plan divides the issues
and prioritizes them according to the situation. They classify issues and works on the
ones that are urgent.
Implement programs: NIPP makes programs that support goals or objectives and
implements them for effectiveness.
Measure effectiveness: after all the steps are performed than the NIPP measures the
effectiveness of the strategy.
Why companies need to understand and create a protocol for insider threats
Insider threat is essentially threats related to information that is present on the network.
Insider threat involves three channels. Employees that have legitimate access to the system and
data as a part of their job, temporary workers contracted to do a job within the company, and
outside insider that has gained access to the network through the acquisition of the private
passwords of devices.
It is essential for both private and government companies to protect their data.
Information such as an organization's internal security information or money account
information. This kind of information is too protected for the company's safety. It is not always
hateful performers outside the group that are at fault, insider threats are a actual danger as well
that shouldn’t be ignored.
Protect Organizations from Insider Threats
Implement Prevention Training for Insider Threats
The organization must instrument an effective management structure to educated its
employees and proactively detect threatening signs to minimize insider threats. Organizations
Domestic Infrastructure Protection Plan and Functions_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CRITICAL INFRASTRUCTURE AUTHORITIES.
|7
|984
|44

Cyber Security and Emergency Management: Strategies and Frameworks
|8
|1963
|223

Vulnerability Evaluation | Essay
|4
|286
|22

Cybersecurity Assignment 2022
|12
|3058
|22

Critical Infrastructure of Pamado Algara and Sons Private LTD Presentation 2022
|8
|265
|16

Big Data Privacy: Balancing Personalization and Privacy
|19
|4957
|121