Risk Assessment and Risk Management | Report

Added on - 05 Feb 2020

  • 12

    pages

  • 3455

    Words

  • 42

    Views

  • 0

    Downloads

Showing pages 1 to 4 of 12 pages
CRITICALINFRASTRUCTUREPROTECTION
TABLE OF CONTENTSINTRODUCTION...........................................................................................................................1RISK ASSESSMENT......................................................................................................................1Criticality.....................................................................................................................................1Vulnerability...............................................................................................................................2Threat.........................................................................................................................................3Risk............................................................................................................................................3RISK MANAGEMENT...................................................................................................................4Loopholes and Weaknesses.........................................................................................................4Recommendations.......................................................................................................................5CONCLUSION................................................................................................................................7REFERENCES................................................................................................................................8
INTRODUCTIONCritical infrastructure protection is the process of preparedness for the prevention andsecurity of the assets of the nations which is significantly essential for the functioning of theeconomy. These crucial assets are referred as the critical infrastructure which includes facilitiesprovided by Government bodies that are telecommunication, transportation, energy generation,public health and many other related (Lewis, 2014). These infrastructures due to large domain ofcoverage of population are susceptible to destructive incidents such as terrorism. Hence, asystematic and planned approach is adopted to protect them which is referred as criticalinfrastructure protection. Among the mentioned infrastructures, railways is considered as one ofthe most vulnerable targets for terrorism.In that context, report is prepared to elucidate the use of critical infrastructure protectionat selected railways, Acela Express that runs between Washington D. C. and Boston, USA. Thistrain runs with high speed with the annual rider-ship of approximately 3,343,150 people everyyear. The report discusses different aspects of the concept that are performing risk assessmentand risk management through different stages.RISK ASSESSMENTCriticalityThe selected railway, Acela Express between Washington D. C. and Boston, USA isrequired to be work under critical infrastructure protection. There are many reasons associatedwith its falling in the scope of high degree of criticality. The foremost reason for this is thedestinations at which it is serving the people for their mobility (Yusta, Correa and Lacal-Arantegui, 2011). These two are the financial centres of the country from where large number ofpeople travel every day for their varied purposes. The facilities provided by the train in form ofadvanced infrastructure, high speed, latest features like Wi-Fi and easy accessibility maketravelling comfortable for people and thereby, increasing the number of passengers on thefrequent basis.Further, the excellence in the operations and functioning in the train enables customersattracted towards using of its services and opting it for the travelling. Due to significant amountof use of the train by the natives and immigrants at the place, the train is considered theprominent one around the globe (Chen and et.al., 2011). Being that, it increases the possibility of1
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document