Risk Assessment for Critical Infrastructure Protection: Acela Express

Verified

Added on  2020/02/05

|12
|3455
|212
Report
AI Summary
This report delves into the critical infrastructure protection of the Acela Express, a high-speed railway connecting Washington D.C. and Boston, USA. It begins with an introduction to critical infrastructure protection and its significance, particularly in the context of potential terrorist threats. The report then conducts a comprehensive risk assessment, evaluating the criticality of the Acela Express, its vulnerabilities, and the threats it faces, including terrorism. It further analyzes the risks associated with these threats, such as mass destruction weapons and the growing complexity of interconnected systems. The report proceeds to address risk management, identifying loopholes and weaknesses in current security measures. It offers several recommendations, including the development of a comprehensive security plan, the installation of advanced security equipment, and the enhancement of employee training. The report emphasizes the importance of both hard and soft security measures to effectively mitigate risks and protect the railway infrastructure and its passengers. Finally, it concludes with a summary of the key findings and recommendations, underscoring the need for proactive and multifaceted strategies to ensure the safety and security of critical infrastructure.
Document Page
CRITICAL
INFRASTRUCTURE
PROTECTION
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
RISK ASSESSMENT......................................................................................................................1
Criticality.....................................................................................................................................1
Vulnerability...............................................................................................................................2
Threat .........................................................................................................................................3
Risk ............................................................................................................................................3
RISK MANAGEMENT...................................................................................................................4
Loopholes and Weaknesses.........................................................................................................4
Recommendations.......................................................................................................................5
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
Document Page
Document Page
INTRODUCTION
Critical infrastructure protection is the process of preparedness for the prevention and
security of the assets of the nations which is significantly essential for the functioning of the
economy. These crucial assets are referred as the critical infrastructure which includes facilities
provided by Government bodies that are telecommunication, transportation, energy generation,
public health and many other related (Lewis, 2014). These infrastructures due to large domain of
coverage of population are susceptible to destructive incidents such as terrorism. Hence, a
systematic and planned approach is adopted to protect them which is referred as critical
infrastructure protection. Among the mentioned infrastructures, railways is considered as one of
the most vulnerable targets for terrorism.
In that context, report is prepared to elucidate the use of critical infrastructure protection
at selected railways, Acela Express that runs between Washington D. C. and Boston, USA. This
train runs with high speed with the annual rider-ship of approximately 3,343,150 people every
year. The report discusses different aspects of the concept that are performing risk assessment
and risk management through different stages.
RISK ASSESSMENT
Criticality
The selected railway, Acela Express between Washington D. C. and Boston, USA is
required to be work under critical infrastructure protection. There are many reasons associated
with its falling in the scope of high degree of criticality. The foremost reason for this is the
destinations at which it is serving the people for their mobility (Yusta, Correa and Lacal-
Arantegui, 2011). These two are the financial centres of the country from where large number of
people travel every day for their varied purposes. The facilities provided by the train in form of
advanced infrastructure, high speed, latest features like Wi-Fi and easy accessibility make
travelling comfortable for people and thereby, increasing the number of passengers on the
frequent basis.
Further, the excellence in the operations and functioning in the train enables customers
attracted towards using of its services and opting it for the travelling. Due to significant amount
of use of the train by the natives and immigrants at the place, the train is considered the
prominent one around the globe (Chen and et.al., 2011). Being that, it increases the possibility of
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
terrorist attacks at the place. It is quite approachable for the terrorists to reach the train and make
it a soft target. With the attack, train will suffer number of temporary and permanent loss (NERC
CIP (critical infrastructure protection), 2016).
It is one of the most reliable and prominent trains in USA. Terrorist attacks at the place
will directly or directly affect different aspects related to it. Such disruptions occurring in the
nation have cascading effects on other resources and predominantly, on human resources. It
directly affects economic strength of the nation through spoiling the important railway. On
global grounds, it questions the ability of nation to protect itself and function different activities
(Aradau, 2010). Simultaneously, it lowers down the public confidence towards their government
and their functioning. It is regarded as element of soft target due to its prominent spill over
effects on other related components such as growth and development, attracting other
vulnerabilities and related.
Vulnerability
Transportation through railways is vulnerable to terrorist attacks in a various manner.
There are many features associated with it that make it susceptible more such disruptions and can
lead to major loss to the nation in form of infrastructure, human resources, economic strengths
and image on global grounds.
Acela is the train with large number of people travelling with that. It is stated that
presence of such number at the single place makes it approachable for the easy and soft
targeting. In that regard, government makes effort to make the flow of public in a regular
manner at the place in a particular pace and intensity (Edwards, 2014). Through attacking
at such places, substantial amount of people can be targeted at the same time without
making any further variation.
For the attacks, the train can be easily penetrated by the terrorists due to certain kind of
indulgence such as there is very less number of security measures adopted in comparison
to airports and other transportation. It is identified that there is no use of passenger
profiling in a strict manner, their screening, detecting of harmful equipment through
metal detectors and other explosives (Taylor, Fritsch and Liederbach, 2014).
The availability of less number of officials and armed persons along with the easy and
accessible logistics enables the terrorists to penetrate into place in a very easy manner.
2
Document Page
Further, in trains such as Acela Express, the communication becomes significantly less
powerful that insulates the passengers from seeking any sort of help from the outsiders.
Threat
USA has always been the prime focus for the terrorist’s attacks by many terrorists group
due to its fast paced technological and economic growth. In the recent times, it has been
identified that terrorist activities at such places have been inflicted in a significant manner. The
amplified occurrence of disruptions has made the country susceptible to it. Among the many, the
most prominent group whose activities at the nations were frequent is Al-Qaeda terrorist
organisation. It has been in the war with the country since long history due to number of reasons
(Marrone and et.al., 2013). Further, the train Acela Express is running between the prominent
destinations that are Washington D. C. and Boston, so it can be articulated that the group is more
likely to attack the train in foreseeable future. The reasons found for attacking can be many such
as support extended by USA to Israel and its involvement in the Persian Gulf War. Hence, it can
be stated that the two major factors associated with it that are the significance of the destination
points of Acela express and the sense of retaliation by the mentioned terrorist group, Al-Qaeda
make it likely to attack the express in near future.
Risk
There are number of risks associated that are posed by the terrorism at the Acela Express.
It is found that there are large number of risks linked with the terrorism at the train as explained
in the following manner.
Mass destruction weapons: Advancement of technology has eased the lives of people in
different forms such as saving time and pacing faster the activities performed by them.
Along with this, there are many hazardous impacts of the technology. One such
consequence is the invention of high destructive weapons that leads to killing of large
number of people (Ouyang, 2014). With the advancement in information and
communication, the networking of terrorists has become very strong and widened. By
this, they are able to convert the plans into action in an easy and accessible manner.
Growing complexity and interconnectedness: It is found that in the modern society along
with the increased connectivity and networking, the complexities are raising in a
significant manner. These leads to dis-functioning of all the other activities that can cause
harm to the society in a substantial manner. There is reluctance among the people with
3
Document Page
respect to the tolerance and other required aspects. Further, in-spite of having the
international organisation functioning in this dimension of mitigating the terrorists
activities from the world, the non-corporative behaviour from different elements restrict
the nation and institutes to have protected environment.
The Weakest Links: The most significant risk in the present time associated with
terrorism at the train Acela Express is the weak links available at the place. As
Washington D. C. is the capital of the nation and has large per capita income of people so
it is suffering from the number of factors that pose terrorism at the place (Krutz and
Vines, 2010). One such factor is unequal income distribution. It is found that people
living there are having large differences in their incomes among them. This makes the
poor people to get approach for the execution of such disruptive activities for money and
economic earning. If they remain reluctant in this aspect, they are threatened for the
survival of their families.
RISK MANAGEMENT
Loopholes and Weaknesses
There are number of loopholes in the security and safety measures for the prevention
from terrorist activities at the selected Train, Acela Express.
Fore- Mostly, there is lacking the preciseness of the plans and strategy formulated for
such reasons. It is found that planners do not keep in consideration all the components
associated with it due to which terrorist activities take place. With the advancement in
technology and development of countries, it is found that places such as trains are
becoming more susceptible to such disruptions. The plan fails to identify the potential
risk associated with it such as in the form of terrorist group which is most likely to attack
the train and its passengers at their destination and in-between stops (Knapp and Langill,
2014).
There are so much operational lacunae in the security measures adopted against the
terrorist activities. There are many instances seen where employees and other members
linked with the administration that helps to execute the plan made by the terrorists group.
Corruption and bribery are the most hazardous elements found in the process that target
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
the security and safety of patrons to the utmost level (Six Internet Safety Loopholes
Parents Need to Know; Free Net Nanny, 2011).
Employees working are not trained to the adequate amount. There is frequent up
gradation in the technology and equipment for the security purposes. In-spite of the
availability of such equipment, the officers and concerned workers are not endowed with
the required knowledge and information for the processing (Ericsson, 2010). They are
unable to use of those equipment assigned by the national government and other
organisations which are catering to make it function.
Recommendations
There are certain ways in which security of railways can be increased to a significant
level. It will ensure the protection of passengers travelling between Washington D.C. and
Boston, USA. It is recommended to adopt the risk mitigation and risk control measures in which
with the adoption of appropriate methods, the risk will be alleviated, reduced or mitigated. There
are some security elements which are required to be addressed with the analysis of incidents.
There is need to consider broader perspective that is implementing both the soft and hard
security measures. Hard security refers to the process of adopting the measures in the form of
equipment and other related. On the other hand, soft security is about bringing awareness and
making the higher degree of involvement of society in the process of protection of these assets
and infrastructure (Brassett and Vaughan-Williams, 2015). Following are the steps that will
accrue lucrative results in the critical infrastructure protection.
It is required to create a proper plan with the inculcation of all the components that are
affecting the infrastructure in one way or other in a significant manner. It requires several
stages in it such as identification of components involved in it, vulnerabilities associated
with it and methods to process the solutions. It includes the adoption of process in certain
stages that are preventing the train through adequate measures, identification and dealing
of vulnerabilities, assessing and managing of associated risks as well as lastly mitigating
the threats.
Installation of certain equipment will be helpful in dealing with the situations related to
safety and security as well as it will prevent occurrence of the terrorist activities along
with providing the measures to deal with them in case of encountering with them
(Bagheri and Ghorbani, 2010). It includes making the availability of certain equipment
5
Document Page
such as blast resistant trash containers that can inhibit the occurrence of any blast. This
will reduce the use of such places which are well utilized by the terrorists to place bombs
and other destructive explosives at these crowed places.
It is imperative to get acquainted the employees with the adequate amount the facilities
that makes their working precise and appropriate. It includes the provision of visibilities
to the employees so that they are aware of happenings throughout the complete premises.
Along with this, making the control room with surveillance of each point and activities at
station through CCTV cameras will prevent any sort of mis-hapenning (Rübbelke and
Vögele, 2011). This control room is required to be in direct contact with vigilance in any
kind of disruptions occurring.
Training and mentoring of the employees play a vital role in the risk mitigation process.
It is found that employees working in the train are accountable for the safety and security
of the travellers and making them reach their destination safely. Hence, through
providing them adequate training and development, it can be resolved. Employees are
trained in different aspects such as ensuring the safety and security of passengers through
identifying and reporting of suspicious behaviour, patrolling unattended packages and
luggage, ensuring that patrons are properly reached to their places and moved from train
etc. Further, along with these, employees are also trained for dealing the situation at
emergency time such as promptness for evacuation and actions required to be taken at
certain urgencies.
Making the availability of adequate amount of officers plays a vital role in making the
security of travellers and express in all manner. Endowed with the required knowledge
and skills to deal with such situations will make the place safe and secure. They are
entitled to make the premises and express safe in all the respect (Walker and Cooper,
2011). For such reasons, alarms and hoaxes are necessary that can be used by all the
persons in case of emergency to aware other individuals about it.
Making contingency plan for any sort of threat will enable to perform functions in a
smooth manner irrespective of any situation. It is essential to make the alternate route
availability and transportation facility if any situation is encountered. It will retain the
trust and confidence of public on the facility.
6
Document Page
Frequent checking and inspection of all the availabilities at the place in different areas on
the frequent basis will make the place risk free from such disruption and decrease the
probability of advantages taken by unauthorised elements (Vugrin, Warren and Ehlen,
2011).
CONCLUSION
Critical infrastructure protection is the method to protect the essentials of the nations
which are used by large number of countrymen. These essentials are having significant
contribution in raising the economic strengths and creating the brand image around the globe. In
that regard, it is observed as the foremost targets for the terrorism activities. Hence, it is
imperative to adopt the structured method to protect them from such vulnerabilities and utilize
these assets in a productive manner. The study has been done on the renowned train in USA that
is Acela express that runs between Washington D. C. and Boston having 14 stops in-between. In
this way, it carries large number of passengers daily on this route and is susceptible to the
terrorist attacks. It is further found that there is immense need of making the use of this model at
this express to prevent it from any kind of terrorist disruption. From the study, it is articulated
that there are some measures which it can be regulated such as it includes four stages that are
protection, identification and dealing with vulnerability, risk assessment and management as well
as mitigation of all these factors.
7
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
REFERENCES
Journals and Books
Aradau, C., 2010. Security that matters: Critical infrastructure and objects of protection. Security
Dialogue. 41(5). pp. 491-514.
Bagheri, E. and Ghorbani, A. A., 2010. UML-CI: A reference model for profiling critical
infrastructure systems. Information Systems Frontiers. 12(2). pp. 115-139.
Brassett, J. and Vaughan-Williams, N., 2015. Security and the performative politics of resilience:
Critical infrastructure protection and humanitarian emergency preparedness. Security
dialogue. 46(1). pp. 32-50.
Chen, J. and et.al., 2011. A survey on quality of service support in wireless sensor and actor
networks: Requirements and challenges in the context of critical infrastructure protection.
Journal of Network and Computer Applications. 34(4). pp. 1225-1239.
Edwards, C. I. P. M., 2014. An analysis of a cyberattack on a nuclear plant: The stuxnet worm.
Critical Infrastructure Protection. 116. p.59.
Ericsson, G. N., 2010. Cyber security and power system communication—essential parts of a
smart grid infrastructure. Power Delivery, IEEE Transactions on. 25(3). pp. 1501-1507.
Knapp, E. D. and Langill, J. T., 2014. Industrial Network Security: Securing critical
infrastructure networks for smart grid, SCADA, and other Industrial Control Systems.
Syngress.
Krutz, R. L. and Vines, R. D., 2010. Cloud security: A comprehensive guide to secure cloud
computing. Wiley Publishing.
Lewis, T. G., 2014. Critical infrastructure protection in homeland security: defending a
networked nation. John Wiley & Sons.
Marrone, S. and et.al., 2013. Vulnerability modeling and analysis for critical infrastructure
protection applications. International Journal of Critical Infrastructure Protection. 6(3).
pp. 217-227.
Ouyang, M., 2014. Review on modeling and simulation of interdependent critical infrastructure
systems. Reliability engineering & System safety. 121. pp. 43-60.
8
Document Page
Rübbelke, D. and Vögele, S., 2011. Impacts of climate change on European critical
infrastructures: the case of the power sector. Environmental science & policy. 14(1). pp.
53-63.
Taylor, R. W., Fritsch, E. J. and Liederbach, J., 2014. Digital crime and digital terrorism.
Prentice Hall Press.
Vugrin, E. D., Warren, D. E. and Ehlen, M. A., 2011. A resilience assessment framework for
infrastructure and economic systems: Quantitative and qualitative resilience analysis of
petrochemical supply chains to a hurricane.Process Safety Progress. 30(3). pp. 280-290.
Walker, J. and Cooper, M., 2011. Genealogies of resilience from systems ecology to the political
economy of crisis adaptation. Security dialogue. 42(2). pp. 143-160.
Yusta, J. M., Correa, G. J. and Lacal-Arantegui, R., 2011. Methodologies and applications for
critical infrastructure protection: State-of-the-art. Energy Policy. 39(10). pp. 6100-6119.
Online
NERC CIP (critical infrastructure protection). 2016. [Online]. Available through:
<http://searchcompliance.techtarget.com/definition/NERC-CIP-critical-infrastructure-
protection>. [Accessed on 4th June 2016].
Six Internet Safety Loopholes Parents Need to Know; Free Net Nanny. 2011. [Online]. Available
through: <https://www.netnanny.com/company/press/internet_safety_month_2011/>.
[Accessed on 4th June 2016].
9
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]