Case Study Phase 3: National Infrastructure Protection Plan

 

 

                                                             

 

 

 

 

Case Study Phase 3: National Infrastructure Protection Plan     

Amare Alemu

Strayer University

CIS 502: Theory of Security Management

Professor Mark O. Afolabi, Ph.D.

August 23, 2017

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Case Study Phase 3: National Infrastructure Protection Plan

Introduction

           The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of existing and future Critical Infrastructure and Key Resources (CIKR) protection efforts and resiliency strategies into a single national program to achieve it. In this regard to have successful achievement the plan should be backed up with appropriate budgetary plan as well. Thus, in this paper, first, the components will be analyzed. Secondly, the paper will assess the cost of managing risk. Next, the paper will provide resources for the CIKR Protection Program. Further, the article will ensure an Effective, Efficient Program Over the Long Term. Lastly, the article will provide a summary of National Infrastructure Protection Plan.

         According to John Kelly, (2018), the author, discussed on five components and analyzed them as follows. 1. Securing Our Borders: Securing our Nation’s land and maritime borders is critical, and requires investment in people, infrastructure, and technology. To stop illegal migrants, criminals, and terrorists from threatening our homeland, we need to know who is coming into our country, where they have been, and why they want to come. Fostering legal pathways for immigration, trade, and travel remain vital DHS goals and support our compliance with the President’s Executive Orders, even while we focus on reducing the flow of illegal immigration and illicit contraband. 2. Enforcing Our Immigration Laws: Enforcing and administering the Nation’s immigration laws continues to be a priority of the Department. The United States welcomes anyone who comes to our country by legal means; however, illegal immigration presents unknown risk to the safety and security of the American people. Each day, the dedicated men and women of U.S. Immigration and Customs Enforcement (ICE) carry out their mission and enforce our Nation’s existing immigration laws to protect the United States from the cross-border crime and illegal immigration that threaten national security and public safety and economic security. DHS is committed to the rule of law and is taking targeted enforcement actions to identify, locate, arrest, and deport illegal aliens from the United States. 3. Cyber Security: As cyber threats evolve; DHS’s intelligence enterprise is evolving to implement real-time prevention and mitigation strategies and ensure the right people get the right information on time. 4. Aviation Security: The threat to aviation security remains high, and criminals and terrorists continue to target airlines, airports, and the security and law enforcement officials who protect them. 5. American Preparedness and Resilience: Natural disasters, major accidents or disruptions continue to challenge DHS and the Nation. In collaboration with State, local, and tribal governments across the country the Federal Emergency Management Agency (FEMA) ensures effective emergency responses to mitigate destruction caused by, and recover from, a variety of disasters ranging from unforeseen, no-notice events to catastrophic events such as hurricanes and tornados. It is also discussed by Michael Chertoff, (2009). Secondly, according to John Kelly, (2018), the author, the topic of the cost of managing risk is assessed rigorously. Based on this assessment the total cost will be $44.1billion for the Department of Homeland Security. The cost among the components will be shown on spreadsheet 1 below.

Spreadsheet 1 Cost/Budget Structure of DHS

 

Components

Cost in Billion Dollar

1

American Preparedness and Resilience

9.5000

 

Disaster Relief Fund

7.4000

 

Federal Assistance Program

2.1000

2

Aviation Security

3.8822

 

Biometric Initiatives

0.3540

 

Transportation Security Officers

3.1000

 

Baggage Screening Technolgy

0.2772

 

Visible Intermodal Prevention & Response

0.1510

3

Cypber Security

1.9335

 

US Cyber Infrastructure

0.9713

 

National Cybersecurity Protection

0.3972

 

Next Generation Network

0.5650

4

Enforcing Our Immigration Laws

3.6800

 

Detention Beds Funds

2.7000

 

Interior Enforcement Activities

0.1859

 

Detention Transportation

0.4849

 

Alternatives to Detention Program

0,1777

 

E-Verify Operations & Upgrades

0.1315

5

Securing Our Borders

11.4578

 

US Coast Guard Operating Expenses

7.2000

 

Border Wall Constructions

1.6000

 

Recapitalization of USCG Assets

1.2000

 

High Priority Tactical Border Security

0.9758

 

Federal Law Enforcement Training

0.2728

 

Non Intrusive Inspections

0.1092

 

Support Border Patrol

0.1000

6

Miscellaneous

13.6465

 

Total

44.1000

Next, the author Michael Chertoff, (2009), discussed and provided resources for the CIKR Protection Program. First, Sector-Specific Agency Reporting to DHS: The interdependencies among sectors can cause duplicative efforts or lead to gaps in funding for CIKR protection. To ensure that government resources are allocated according to national priorities and are based on national risk, need, and effective risk-reduction opportunities, DHS must be able to accurately assess priorities, requirements, and efforts across these diverse sectors. Requirements driven by regulations, statutes, congressional mandates, and presidential directives should also be considered. Second, State Government Reporting to DHS: DHS requires that each State develop a homeland security strategy that establishes goals and objectives for its homeland security program, which includes CIKR protection as a core element. State administrative agencies develop a Program and Capability Enhancement Plan that prioritizes statewide resource needs to support this program. Third, State, Local, Tribal, and Territorial Government Coordinating Council Reporting to DHS: The intent of the SLTTGCC is to provide input and suggestions for implementation of the NIPP, including sector protection programs and initiatives. These types of engagements foster broad public sector partner involvement in actively developing CIKR protection priorities and requirements. Fourth, Regional Consortium Coordinating Council Reporting to DHS: Cross-sector and multi-jurisdictional CIKR protection challenges provide an opportunity to manage interdependent risks at the regional level. Individually, the activities of the regional consortium enhance the physical security, cyber security, emergency preparedness, and overall public-private continuity and resiliency of one or more States, urban areas, or municipalities. Fifth, Aggregating Submissions to DHS: DHS uses the information collected from the Sector CIKR Protection Annual Reports, the SLTTGCC Annual Report, the RCCC Annual Report, and State reports to assess CIKR protection status and requirements across the country. Furthermore, according to Sujeet Shenoi, (2017), the critical infrastructure sectors include information technology, telecommunications, energy, banking, and finance. And also include transportation systems, chemicals, significant manufacturing, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, nuclear reactors, materials and waste, postal and shipping and government facilities. Protecting and ensuring the continuity of operation of critical infrastructure assets are vital to national security, public health and safety, economic vitality, and societal well-being. According to Michael Chertoff, (2009), the author, the paper discussed to be ensuring an effective and efficient program over the Long Term. The key activities that are needed for achieving this are 1. Building national awareness to support the CIKR protection program and related investments by ensuring a focused understanding of the all-hazards risk environment and what is being done to protect and enable the timely restoration of the Nation’s CIKR considering such threats; 2. Enabling education, training, and exercise programs to ensure that skilled and knowledgeable professionals and experienced organizations can undertake NIPP-related responsibilities in the future; 3. Conducting R&D and using technology to improve protective capabilities or resiliency strategies or to lower the costs of existing capabilities so that CIKR partners can afford to do more with limited budgets; 4. Developing, protecting, and maintaining data systems and simulations to enable continuously refined risk assessment within and across sectors and to ensure preparedness for domestic incident management; and 5. Continually improving the NIPP and associated plans and programs through ongoing management and revision, as required.

           In conclusion, the paper, firstly, discussed and analyzed the components. Next, the paper assessed the cost of managing risk. Further, the paper provided resources for the CIKR Protection Program. Lastly, the article suggested the topic of Ensuring an Effective, Efficient Program Over the Long Term.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Kelly, John. (2018). FY 2018 Budget in Brief. Retrieved on August 22, 2017

from https://www.dhs.gov/publication/fy-2018-budget-brief

Chertoff, M. (2009). National Infrastructure Protection Plan. Retrieved

          on August 22, 2017, from http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf

 

 Shenoi S. (2017). International Journal of Critical Infrastructure Protection. Retrieved on    

         August 22, 2017, from https://www.journals.elsevier.com/international journal-of-critical infrastructure-protection/

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Comments

Popular posts from this blog

Assignment 3: Apple versus Samsung

Case Study 2: Wireless and Mobile Technologies

Week 8 Java Project [Ticket.java]