Unit 1: The Definition of Critical Infrastructure Protection
HLS 470: Evaluating Risk in Critical Infrastructure
(00000)
College
Submitted to ProfessorStudent Name
January 19 , 2020Executive Summary
Briefly summarize the purpose, background, analysis methodology, task requirements, key findings and recommendations.
Executive Summary is the preferred methodology in business and government. You may use Abstract, but if that choice is made; you shall include a Key Word Summary.
An executive summary or abstract is required if the body content is four (4) or more pages in length.Key Word Summary:Table of Contents
Executive Summary i
Purpose 3
Legal Definition of Critical Infrastructure 3
The Importance of Critical Infrastructure Protection 3
Background Information 3
Federal Laws 3
Federal Policy 3
National Strategies 3
Code of Federal Regulations 3
Doctrine 4
Comparison of Doctrine to Policy 4
The Sixteen Critical Infrastructure Sectors 4
Summary and Recommendations 4
Summary. 4
Recommendations. 4
Works Cited 5
References 6
Abbreviations and Acronyms 7Purpose
Define the purpose of the paper for the reader. Refer to the task scenario for this. Use at least four (4) complete sentences.
Legal Definition of Critical Infrastructure
Research the US law (United States Code (USC) that defines Critical Infrastructure. Remember that a paragraph is composed of at least four (4) complete sentences as defined by the APA 6th Edition.
The Importance of Critical Infrastructure Protection
Address the who, what, when, where, and most importantly the WHY of CI Protection to the local community. This is a good place to mix official and authoritative research documents from the Office of Infrastructure Protection, Directorate of Programs and Protection, Department of Homeland Security and academic sources on the subject (www.HSDL.org is a good source for academic peer-reviewed documents).
Background Information
Complete as required.Federal Laws
Address the primary laws covering CI Protection. Include the USA PATRIOT Act of 2001, the Homeland Security Act of 2002, and the Intelligence Reform and Terrorism Prevention Act (IRPTA) of 2004.Federal Policy
Discuss the following as part of the CI Protection initiative: Homeland Security Presidential Directive (HSPD) 7 – Critical Infrastructure Identification, Prioritization, and Protection; Presidential Policy Directive (PPD) 21- Critical Infrastructure Security and Resilience; and Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity, February 12. 2013.National Strategies
Address the following as part of the CI Protection initiative: The National Homeland Security Strategy; Strategic Plan on Infrastructure Protection Assessments; The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets.Code of Federal Regulations
Address the following as part of the CI Protection initiative: – Code of Federal Regulations (CFR). Title 6, Domestic Security; Title 44, Emergency Management and Assistance; Title 49, Transportation.Doctrine
Address the following as part of the CI Protection initiative: – National Response Framework (NRF), The NRF Critical Infrastructure Annex, The National Infrastructure Protection Plan, and the Sector Specific Protection Plans (16 total).
Comparison of Doctrine to Policy
Address the following as part of the CI Protection initiative: – NIPP to PPD – 21 and EO 13636.The Sixteen Critical Infrastructure Sectors
Address the following as part of the CI Protection initiative: identify each of the sixteen (16) CI sectors as described by PPD21. Be sure to identify key elements and the Sector Specific Agency (ies) for each sector.
Summary and Recommendations
Briefly summarize the key points that have been developed within the paper. (Public, 2010). Add recommendations in this section as a subparagraph if required by the tasking. Do so by adding a sub-paragraph level (meaning heading 2 under styles).
Note: a heading level entry must be followed by at least two (2) full lines of text. If this is not possible prior to an automatic page break then force a page break by using the Insert page break command.Summary.
Summarize key points and findings of the analysis. A very key point in writing: in qualitative analysis papers, such as in this course, only summaries can be provided. In quantitative analysis work (i.e. number crunching scientific methodology using statistical analysis) conclusions may be reached from the resulting data analysis.Recommendations.
Be specific in your recommendations. Include courses of action (COA), steps, procedures to be taken, etc.Works Cited
Craig, C. (2013). Writing Tips. Tmbuktoo, : DoWap Publishers.
Public, J. (2010). How to Write a Report. Department of Homeland Security, US Government. Washington, D. C.: US Government Printing Office. Retrieved February 28, 2013, from www.dhs.govNote: the above table has been created using the tools in Word to create the in-text citation and then the bibliography, refer to Word Help to Create In text Citations and Bibliographies. There is a primer on using Word tools to do this in the Course Resources, Learning Materials, Unit 1, Individual Projects. You shall delete the above examples in your submission of the assignment. All of the materials addressed (laws, policy, strategies, CFR regulations, doctrine) in the yellow highlighted areas of this template are your references. That is what should be listed here. You may delete the examples in one of two ways. The first is to remove the citation that is within the text. Highlight and delete. The second is after you have created your bibliography, click on the table, once in the table, then highlight and delete the examples above.References
Note: in professional documents, References are all publications that have direct impact on the paper’s topic. References are listed in order of precedence and by date. Examples below. Think about the type of document you are producing for the course that you are in and what is expected for that specific task (meaning read the task requirements carefully).
USA PATRIOT Act of 2001, 18 USC
Homeland Security Act of 2004
Presidential Policy Directive 21, Critical Infrastructure Security and Resilience
Presidential Homeland Security Directive 7, Critical Infrastructure
Executive Order 13636, Critical Infrastructure and Resilience
Homeland Security Strategy, 2007
National Infrastructure Protection Plan, 2014
National Response Framework, 2014
Code of Federal Regulations 41 (41 CFR), Critical Infrastructure
Etc.Abbreviations and Acronyms
APA – American Psychological Association
FBI – Federal Bureau of Investigation
FEMA – Federal Emergency Management Agency
Radar – Radio Detection and Ranging
TOC – Table of ContentsNote that the listing is in alphabetical order of the abbreviation or acronym. Not all abbreviations are acronyms. Radar is an acronym that has become an actual word. RADAR stands for Radio Detection and Ranging. The general rule of thumb is more than four (4) abbreviations or acronyms a definitions page becomes a requirement.—You are the Critical Infrastructure Protection (CIP) Officer in the Plans Directorate of your County Emergency Management Agency. Your county commissioners have decided, based on continuing economic factors and other municipality-level constraints, that the county may be better suited to orchestrate and implement the National Infrastructure Protection Plan (NIPP) better than the municipalities.The paucity of available and full-time assets in the municipalities will simply not support successful implementation of this national-level plan. Based on your education and training, the county Emergency Management Coordinator (EMC) has selected you to oversee, orchestrate, and synchronize the efforts of all associated stakeholders in meeting the six objectives in the NIPP. The county EMC would like this product in the form of a strategy (e.g., short and broad but addressing the key tenets) and the objectives stated in the NIPP.He does not seek the intricate details that are normally associated with a program or plan; rather, he wants an overarching document that provides the affected stakeholders (e.g., owners or operators of Critical Infrastructure (CI), associated first responders, elected officials, and other public safety officials) with a strategy for protecting the county’s CI. He specifically wants the strategy to include a vision, goal, what needs to be accomplished, how you intend to accomplish each objective, and the resources that you intend to use to enable this strategy.Using what you have learned thus far from the statutory, directive, plan references, and any dialogue with your colleagues, develop a County Strategy for Critical Infrastructure Protection that includes the specified tasks directed by your County EMC. Your only constraint is that this is not intended to be the intricate detailed plan for executing each implied task associated with critical infrastructure protection. It is meant to provide a reader with a general sense of background, purpose, tasks to be performed, and a conceptual framework of how you intend to execute the county responsibilities for successful completion of all specified and implied tasks.Assignment DetailsAddress the following in a strategy document of 2-3 pages:In your county CIP strategy, include the following components:
Vision
Goal
What needs to be accomplished
How you intend to accomplish each objective
The resources that you intend to use to enable this strategy
How will you synchronize the efforts of all associated stakeholders in meeting the six objectives in the NIPP? Explain in detail.
Remember to be specific and detailed in your county CIP strategy.
This is a formal report that you are submitting for approval, so be sure to utilize the correct format.
Be sure to reference all sources using APA style
Approximate price: $22
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.
HLS 470: Evaluating Risk in Critical Infrastructure
Never use plagiarized sources. Get Your Original Essay on
HLS 470: Evaluating Risk in Critical Infrastructure
Hire Professionals Just from $11/Page