SlideShare a Scribd company logo
1 of 27
INFRASTRUCTUTRE SECURITY




“To build and implement a robust strategy to protect our critical infrastructures and key assets from further
terrorist exploitation, we must understand the motivations of our enemies as well as their preferred tactics
and targets.”


                                                                      Submitted by:       ADHAR
Contents

• Introduction
• AIM of Infrastructure Security
• Areas of critical infrastructure
• Potential threats to infrastructures
• Identifying Weaknesses in a Critical
  Infrastructure
• Defence Critical Infrastructure Program
  Procedures
• Example: Department of Homeland
Introduction

      Infrastructure security is the security provided to protect
infrastructure, especially critical infrastructure, such as airports,
highways , rail transport, hospitals, bridges, transport hubs, network
communications, media, the electricity grid, dams, power plants, seaports,
oil refineries, and water systems etc.
AIM of Infrastructure Security

Safeguard the basic three basic assets:


1. Physical assets (e.g. facilities, components, real estate,
 animals, and products etc.)
2. Human assets (e.g. operations, and sensitive area and
information etc.)
3. Cyber assets     (e.g. electronic and computer networks )
Areas of critical infrastructure
i.    Agriculture & Food
ii.   Water
iii. Public Health
iv. Emergency Services
v. Government
vi. Defence Industrial Base
vii. Information and Telecommunications
viii. Energy
ix. Transportation
x. Banking and Finance
xi. Chemical Industry and Hazardous
      Materials
xii. Postal and Shipping.
Agriculture & Food
This industry accounts for a large share of Gross Domestic Product. Areas of
concern include: Supply chains for feed, animals and animal products; Crop production
and supply chains of seed, fertilizer and other related materials; post-harvesting
components of processing, production and packaging, storage.


Water
 This sector is divided into two areas: fresh water supply and wastewater collection. The
water sector criticality extends to both public health and the economy.


Public health
This area consists of state/local health departments, hospitals, health clinics, mental
health facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these
would be critical after any form of attack or natural event. The personnel and
facilities
within this sector are trained and ready to react to emergency situations.
Emergency services
This area includes fire, rescue, emergency medical service (EMS), and law
enforcement
organizations. The emergency services sector differs from other
infrastructures in its focus and criticality is in its personnel and equipment,
rather
Government
than a facility.
 The government itself can be viewed as a critical infrastructure, with
its ability to
command and control the response to any attack, terrorist or natural
to any of our
Defence base
infrastructures.
 The private sector is critical to the Department of Defence effectively conductin
defence missions, mobilizing and deploying of our military forces abroad.
Information & Telecommunication
The telecommunications sector is vast and dispersed, containing both cyber an
physical
elements. The telecommunications sector provides voice and data service to th
public
and private users through use of the Public Switched Telecommunications Netw
(PSTN), the internet, and private enterprise networks..
Energy
Energy is the infrastructure that supplies the driving force in most of
American life today.
Energy of some kind heats our homes, moves us for one point to another
and drives our
businesses and industry. The energy sector is critical to the well being of
our economy,
national defence and quality of life. The sector is divided into to
Transportation
The area includes aviation, rail, pipelines, highways, trucking and
busing, and public
mass transit. The scope of the transportation sector makes it critical to both
our economy
Banking and Finance.
and national security.
This sector is made up of physical structures and assets as well as
personnel and cyber
assets. Retail and wholesale banking institutions are located in large office
buildings
with large groups of people. The financial sectors infrastructure includes
computer
networks, storage devices and telecommunications networks. This sector is
also
Chemical industries.
This sector impacts several other sectors; finance, agriculture, water, health
care, etc. The Chemical industry produces fertilizer for agriculture, chlorine
for water purification and polymers that create plastics from petroleum. The
sector is also a lucrative terrorist
target due environmental impact from the physical destruction of many of its
Postal and shipping.
sites
The postal system is interconnected with other infrastructure
systems, especially
transportation. The postal service controls thousands of points of entry as
well as
millions of facilities.
Potential threats to infrastructure




“The insider threat to critical infrastructure is one or more individuals
with the access
and/or inside knowledge of a company, organization, or enterprise
that would allow
them to exploit the vulnerabilities of that entity’s
security, systems, services, products, or facilities with the intent to
Terrorism - person or groups deliberately targeting critical
infrastructure for political gain


 CITATION: World trade center
 9/11
 September 11 Attacks, coordinated terrorist strike on the
 United States in 2001 that killed about 3,000 people and
 shook the nation to its core. twin towers of the World
 Trade Centre in the financial district of New York City. The
 buildings burst into flame and then collapsed, killing
 thousands. A third terrorist crew smashed their plane into
 the Pentagon, headquarters of the U.S. military in
 Arlington, Virginia.
Sabotage - person or groups such as ex-employee, political
 groups against governments, environmental groups in defence of
 environment.
CITATION: Bangkok's International Airport Seized by
Protestors
On 25 November 2008, the People’s Alliance
Democracy executed what they called
"Operation Hiroshima"[A convoy of hundreds of PAD
members dressed in yellow blocked the two ends of
the road in front of the terminal building
of Suvarnabhumi International Airport and
blockaded the main road to the airport. The airport is
Bangkok's main airport and an important regional
hub. PAD leaders mounted a mobile stage and
proceeded to criticize the government. All
Information warfare - private person hacking for private gain or
countries initiating attacks to glean information and also damage a
country's infrastructure.
CITATION: Cyber attacks during the 2008
South Ossetia war

On 5 August 2008 South Ossetia war a series
of cyber attacks swamped and disabled
websites of numerous South
Ossetia, Russian, Georgian, and Azerbaijani
organisations.
South Ossetia to envoy to Moscow, claimed that
Georgia was attempting to cover up information
on events which occurred in the lead up to the
war.
Natural disaster - hurricane or natural events which damage critical
  infrastructure such as oil pipelines, water and power grids.


 CITATION: Economic effects of Katarina

The economic effects of Hurricane Katrina, which

hit Louisiana, Texas and Mississippi in late August

2005,Administration has sought $105 billion for

repairs and reconstruction in the region, making it

the costliest natural disaster in US history. And this

does not account for damage to the economy

caused by potential interruption of the oil supply and
Identifying Weaknesses in a Critical Infrastructure


            Identifying critical infrastructure weakness is based on a risk
management framework. It is continuously influenced by the ever
changing threat environment, both physical and natural. The goal is to
reduce the vulnerabilities to our nation’s assets from attack and natural
disaster.
     Critical infrastructures are composed of physical, personal, and
cyber components, and as any of those three portions change so does
the list of critical assets requiring security.
ASSE
  TS
PHYSICA
   L

                                             Identifying and assessing   Normalizing, analysing, and   Implementing protective
HUMAN       Identifying critical assets
                                                   vulnerabilities               prioritizing                programs
                                                                                                                                 Measuring performance




CYBER




       Feedback to correlating threats to mitigation programs/effectiveness

                                          Infrastructure weakness analysis
IDENTIFYING CRITICAL ASSETS
• The first step will be to identify the critical assets located within area
    of responsibility.
• The process should be an on-going with constant review of unit
    missions, higher headquarters missions and requirements, as well as
    the overall operations within location.
•   The information collected should be used as the base for further
   discussion
IDENTIFYING AND ASSESSING VULNERABILITIES
• Potential areas of weakness need to be identified as well as
    protective measures that need to be undertaken to mitigate
    those vulnerabilities.
• Interdependencies within and between infrastructures need to
    be identified to minimize cascading effects.
•   The vulnerability assessment needs to take into account
NORMALIZING, ANALYSING, AND PRIORITIZING STUDY RESULTS

• The group of accumulating the vulnerability assessments needs to
     normalize the information from each subordinate section or staff, and then
     prioritize against all of the assets the higher organization is responsible
     for.
•     It will identify which areas offer the greatest risk and the best benefit from
     protective measures
    IMPLEMENTING PROTECTIVE PROGRAMS

    • The information gathered during the process will assist in developing
       and executing programs to protect or minimize damage to
       infrastructures.
    • The staff or organization can find assistance in developing programs
       from their agencies. e.g. Department of Homeland Security (DHS).
MEASURING PERFORMANCE

• Metrics need to be established for each protective measure to
  ensure they are being performed consistently, are sustainable and
  are effective.
• Continuous review of the metrics will result in improvements to the
  framework and the protection plan
Defence Critical Infrastructure Program
 Procedures
     DCIP risk management procedures for all critical infrastructures. The
purpose of the DCIP is to ensure the availability of assets critical to all
infrastructures.

      Once risks are assessed in all tasks and missions then possible
responses can be reviewed and emplaced to ensure all missions will be
accomplished no matter what actions are taken against an infrastructure.
The DCIP Interim Implementation Guidance stresses that Risk
management is cyclical, as changes are constantly made to systems and
personnel are replaced, risks to infrastructures must be re-assessed.
Criticality
                       Risk                             Vulnerabilit
                    Assessment
                                        Threats and         y
                                          hazards
   Risk
Management
                                        Remediation
                       Risk
                     Response                            Mitigation
                                       Reconstitution



             Defence Critical Infrastructure Program Procedures flow diagram
Example: Department of Homeland Security

• Officially established in January 2003.
•   The department’s mission is to help prevent
    terrorist attacks in the United States, reduce
    the country’s vulnerability to terrorism, and
    assist in recovery after an attack.
• The department was created in response to
    the September 11, 2001, terrorist attacks
    against the World Trade Centre and the
    Pentagon as a way to oversee and coordinate
    security functions previously performed by
    dozens of different government. agencies.
The department has four main divisions known as directorates, each
    administered by an undersecretary.

• The Directorate of Border and Transportation Security is responsible for
     preventing terrorists from entering the United States; for protecting air, land, and
     sea transportation systems; and for enforcing immigration laws.
•    The Directorate of Emergency Preparedness and Response is responsible for
     coordinating the federal government’s response to terrorist attacks and major
     disasters and for assisting in recovery.
• The Directorate of Science and Technology is charged with overseeing efforts to
     protect the United States from attacks involving
     chemical, biological, radiological, and nuclear weapons. It also conducts and funds
     research related to homeland security.
• The Directorate of Information Analysis and Infrastructure Protection is
     responsible for analysing intelligence from a vast array of federal, state, and local
     agencies in order to detect terrorist threats and identify vulnerabilities in the
SUPPORTING AGENCIES


Many agencies assist the DHS in its mission. Primary responsibility for
investigating and prosecuting acts of terrorism rests with law enforcement
agencies, including the Department of Justice, the Federal Bureau of
Investigation (FBI), and state and local law enforcement agencies. The
CIA gathers overseas intelligence about terrorist threats. Other members
of the intelligence community, such as the National Security Agency
(NSA) and the Defence Intelligence Agency (DIA), also provide the DHS
with information.
References

•   http:/ / www. tsa. gov/ travelers/ highway/ index. shtm
•   http:/ / www. tsa. gov/ who_we_are/ index. shtm
•   Li, Hao et al. (2005-05). "Strategic Power Infrastructure Defense" (http:/ / www. science. smith. edu/
    ~jcardell/ Readings/ TRUST US/ IEEE
•   http:/ / www. webcitation. org/ query?url=http:/ / www. geocities. com/ blohm/ NYTimes130504.
    htm/ & date=2009-10-25+ 13:43:27
•   Massoud, Amin (2002-04). "Security Challenges for the Electricity Infrastructure (Supplement to
    Computer Magazine)". Computer (IEEE
computer society) 35 (4): 8. doi:10.1109/MC.2002.10042.
•   http:/ / www. tswg. gov/ tswg/ ip/ ip_ma. Htm
•   DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism
•   http:/ / www.wikipedia.com
•   Microsoft Encarta.
THANK YOU!!!

More Related Content

What's hot

Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 

What's hot (20)

Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Security policy
Security policySecurity policy
Security policy
 

Viewers also liked

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
VMware vCloud Air: Security Infrastructure and Process Overview
VMware vCloud Air: Security Infrastructure and Process OverviewVMware vCloud Air: Security Infrastructure and Process Overview
VMware vCloud Air: Security Infrastructure and Process OverviewVMware
 
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
Key Findings from Arbor's Tenth World-Wide Infrastructure Security ReportKey Findings from Arbor's Tenth World-Wide Infrastructure Security Report
Key Findings from Arbor's Tenth World-Wide Infrastructure Security ReportAPNIC
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...United Security Providers AG
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
AWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityAWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityNutanix Beam
 
IPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumIPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumAPNIC
 
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...Personal Interactor
 
Cloud Security Secure Your Infrastructure
Cloud Security Secure Your InfrastructureCloud Security Secure Your Infrastructure
Cloud Security Secure Your Infrastructurexband
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0Philippe Bogaerts
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and SecurityCan Demirel
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSSonatype
 
Tech in asia culture code v3
Tech in asia culture code v3Tech in asia culture code v3
Tech in asia culture code v3Tech in Asia
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (19)

Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Robert-DOD Project
Robert-DOD ProjectRobert-DOD Project
Robert-DOD Project
 
Diadelemprendedor10
Diadelemprendedor10Diadelemprendedor10
Diadelemprendedor10
 
VMware vCloud Air: Security Infrastructure and Process Overview
VMware vCloud Air: Security Infrastructure and Process OverviewVMware vCloud Air: Security Infrastructure and Process Overview
VMware vCloud Air: Security Infrastructure and Process Overview
 
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
Key Findings from Arbor's Tenth World-Wide Infrastructure Security ReportKey Findings from Arbor's Tenth World-Wide Infrastructure Security Report
Key Findings from Arbor's Tenth World-Wide Infrastructure Security Report
 
The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
AWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure SecurityAWS & Infrastructure Hardening - Cloud Infrastructure Security
AWS & Infrastructure Hardening - Cloud Infrastructure Security
 
IPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet ForumIPv4 Transfers, Taiwan Internet Forum
IPv4 Transfers, Taiwan Internet Forum
 
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
Intelligent Storage Enables Next Generation Surveillance & Security Infrastru...
 
Cloud Security Secure Your Infrastructure
Cloud Security Secure Your InfrastructureCloud Security Secure Your Infrastructure
Cloud Security Secure Your Infrastructure
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
Automated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSSAutomated Infrastructure Security: Monitoring using FOSS
Automated Infrastructure Security: Monitoring using FOSS
 
Tech in asia culture code v3
Tech in asia culture code v3Tech in asia culture code v3
Tech in asia culture code v3
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Infrastructure security

CompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing SituationCompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing SituationLynellBull52
 
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docxWeek 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docxcockekeshia
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docxShiraPrater50
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesDave Reeves
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Jill Baldwin
 
From Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInterFrom Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInterJeanmarieColbert3
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effectsKimmo Soramaki
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
1) Responded to message below. Should be at minimum of 250 words i.docx
1) Responded to message below. Should be at minimum of 250 words i.docx1) Responded to message below. Should be at minimum of 250 words i.docx
1) Responded to message below. Should be at minimum of 250 words i.docxSONU61709
 
The County Bioterrorism Annex ESF# 8.5 .docx
The County Bioterrorism Annex ESF# 8.5 .docxThe County Bioterrorism Annex ESF# 8.5 .docx
The County Bioterrorism Annex ESF# 8.5 .docxcherry686017
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedSusanaFurman449
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxjuliennehar
 
Sustainability Risk Management: Where Local and Global Perspectives Meet
Sustainability Risk Management: Where Local and Global Perspectives MeetSustainability Risk Management: Where Local and Global Perspectives Meet
Sustainability Risk Management: Where Local and Global Perspectives MeetDallas College
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkETDAofficialRegist
 
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Global Risk Forum GRFDavos
 

Similar to Infrastructure security (20)

CompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing SituationCompanyNotesExecutive SummaryCurrent Marketing Situation
CompanyNotesExecutive SummaryCurrent Marketing Situation
 
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docxWeek 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docx
 
main.pptx
main.pptxmain.pptx
main.pptx
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)Homeland Security And Infrastructure (NPPD)
Homeland Security And Infrastructure (NPPD)
 
From Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInterFrom Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInter
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effects
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
1) Responded to message below. Should be at minimum of 250 words i.docx
1) Responded to message below. Should be at minimum of 250 words i.docx1) Responded to message below. Should be at minimum of 250 words i.docx
1) Responded to message below. Should be at minimum of 250 words i.docx
 
The County Bioterrorism Annex ESF# 8.5 .docx
The County Bioterrorism Annex ESF# 8.5 .docxThe County Bioterrorism Annex ESF# 8.5 .docx
The County Bioterrorism Annex ESF# 8.5 .docx
 
Mike Alagna
Mike AlagnaMike Alagna
Mike Alagna
 
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailedHM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
HM502Unit 5 DQTopic 1 Infrastructure ProtectionA detailed
 
Infrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter ConsequencesInfrastructure Interdependencies: Connections that Alter Consequences
Infrastructure Interdependencies: Connections that Alter Consequences
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docx
 
Sustainability Risk Management: Where Local and Global Perspectives Meet
Sustainability Risk Management: Where Local and Global Perspectives MeetSustainability Risk Management: Where Local and Global Perspectives Meet
Sustainability Risk Management: Where Local and Global Perspectives Meet
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
Criticality analysis of Critical Infrastructures (CI) – parameters and criter...
 
Brochure
BrochureBrochure
Brochure
 

Recently uploaded

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Infrastructure security

  • 1. INFRASTRUCTUTRE SECURITY “To build and implement a robust strategy to protect our critical infrastructures and key assets from further terrorist exploitation, we must understand the motivations of our enemies as well as their preferred tactics and targets.” Submitted by: ADHAR
  • 2. Contents • Introduction • AIM of Infrastructure Security • Areas of critical infrastructure • Potential threats to infrastructures • Identifying Weaknesses in a Critical Infrastructure • Defence Critical Infrastructure Program Procedures • Example: Department of Homeland
  • 3. Introduction Infrastructure security is the security provided to protect infrastructure, especially critical infrastructure, such as airports, highways , rail transport, hospitals, bridges, transport hubs, network communications, media, the electricity grid, dams, power plants, seaports, oil refineries, and water systems etc.
  • 4. AIM of Infrastructure Security Safeguard the basic three basic assets: 1. Physical assets (e.g. facilities, components, real estate, animals, and products etc.) 2. Human assets (e.g. operations, and sensitive area and information etc.) 3. Cyber assets (e.g. electronic and computer networks )
  • 5. Areas of critical infrastructure i. Agriculture & Food ii. Water iii. Public Health iv. Emergency Services v. Government vi. Defence Industrial Base vii. Information and Telecommunications viii. Energy ix. Transportation x. Banking and Finance xi. Chemical Industry and Hazardous Materials xii. Postal and Shipping.
  • 6. Agriculture & Food This industry accounts for a large share of Gross Domestic Product. Areas of concern include: Supply chains for feed, animals and animal products; Crop production and supply chains of seed, fertilizer and other related materials; post-harvesting components of processing, production and packaging, storage. Water This sector is divided into two areas: fresh water supply and wastewater collection. The water sector criticality extends to both public health and the economy. Public health This area consists of state/local health departments, hospitals, health clinics, mental health facilities, laboratories, mortuaries, and pharmaceutical stockpiles. All of these would be critical after any form of attack or natural event. The personnel and facilities within this sector are trained and ready to react to emergency situations.
  • 7. Emergency services This area includes fire, rescue, emergency medical service (EMS), and law enforcement organizations. The emergency services sector differs from other infrastructures in its focus and criticality is in its personnel and equipment, rather Government than a facility. The government itself can be viewed as a critical infrastructure, with its ability to command and control the response to any attack, terrorist or natural to any of our Defence base infrastructures. The private sector is critical to the Department of Defence effectively conductin defence missions, mobilizing and deploying of our military forces abroad.
  • 8. Information & Telecommunication The telecommunications sector is vast and dispersed, containing both cyber an physical elements. The telecommunications sector provides voice and data service to th public and private users through use of the Public Switched Telecommunications Netw (PSTN), the internet, and private enterprise networks.. Energy Energy is the infrastructure that supplies the driving force in most of American life today. Energy of some kind heats our homes, moves us for one point to another and drives our businesses and industry. The energy sector is critical to the well being of our economy, national defence and quality of life. The sector is divided into to
  • 9. Transportation The area includes aviation, rail, pipelines, highways, trucking and busing, and public mass transit. The scope of the transportation sector makes it critical to both our economy Banking and Finance. and national security. This sector is made up of physical structures and assets as well as personnel and cyber assets. Retail and wholesale banking institutions are located in large office buildings with large groups of people. The financial sectors infrastructure includes computer networks, storage devices and telecommunications networks. This sector is also
  • 10. Chemical industries. This sector impacts several other sectors; finance, agriculture, water, health care, etc. The Chemical industry produces fertilizer for agriculture, chlorine for water purification and polymers that create plastics from petroleum. The sector is also a lucrative terrorist target due environmental impact from the physical destruction of many of its Postal and shipping. sites The postal system is interconnected with other infrastructure systems, especially transportation. The postal service controls thousands of points of entry as well as millions of facilities.
  • 11. Potential threats to infrastructure “The insider threat to critical infrastructure is one or more individuals with the access and/or inside knowledge of a company, organization, or enterprise that would allow them to exploit the vulnerabilities of that entity’s security, systems, services, products, or facilities with the intent to
  • 12. Terrorism - person or groups deliberately targeting critical infrastructure for political gain CITATION: World trade center 9/11 September 11 Attacks, coordinated terrorist strike on the United States in 2001 that killed about 3,000 people and shook the nation to its core. twin towers of the World Trade Centre in the financial district of New York City. The buildings burst into flame and then collapsed, killing thousands. A third terrorist crew smashed their plane into the Pentagon, headquarters of the U.S. military in Arlington, Virginia.
  • 13. Sabotage - person or groups such as ex-employee, political groups against governments, environmental groups in defence of environment. CITATION: Bangkok's International Airport Seized by Protestors On 25 November 2008, the People’s Alliance Democracy executed what they called "Operation Hiroshima"[A convoy of hundreds of PAD members dressed in yellow blocked the two ends of the road in front of the terminal building of Suvarnabhumi International Airport and blockaded the main road to the airport. The airport is Bangkok's main airport and an important regional hub. PAD leaders mounted a mobile stage and proceeded to criticize the government. All
  • 14. Information warfare - private person hacking for private gain or countries initiating attacks to glean information and also damage a country's infrastructure. CITATION: Cyber attacks during the 2008 South Ossetia war On 5 August 2008 South Ossetia war a series of cyber attacks swamped and disabled websites of numerous South Ossetia, Russian, Georgian, and Azerbaijani organisations. South Ossetia to envoy to Moscow, claimed that Georgia was attempting to cover up information on events which occurred in the lead up to the war.
  • 15. Natural disaster - hurricane or natural events which damage critical infrastructure such as oil pipelines, water and power grids. CITATION: Economic effects of Katarina The economic effects of Hurricane Katrina, which hit Louisiana, Texas and Mississippi in late August 2005,Administration has sought $105 billion for repairs and reconstruction in the region, making it the costliest natural disaster in US history. And this does not account for damage to the economy caused by potential interruption of the oil supply and
  • 16. Identifying Weaknesses in a Critical Infrastructure Identifying critical infrastructure weakness is based on a risk management framework. It is continuously influenced by the ever changing threat environment, both physical and natural. The goal is to reduce the vulnerabilities to our nation’s assets from attack and natural disaster. Critical infrastructures are composed of physical, personal, and cyber components, and as any of those three portions change so does the list of critical assets requiring security.
  • 17. ASSE TS PHYSICA L Identifying and assessing Normalizing, analysing, and Implementing protective HUMAN Identifying critical assets vulnerabilities prioritizing programs Measuring performance CYBER Feedback to correlating threats to mitigation programs/effectiveness Infrastructure weakness analysis
  • 18. IDENTIFYING CRITICAL ASSETS • The first step will be to identify the critical assets located within area of responsibility. • The process should be an on-going with constant review of unit missions, higher headquarters missions and requirements, as well as the overall operations within location. • The information collected should be used as the base for further discussion IDENTIFYING AND ASSESSING VULNERABILITIES • Potential areas of weakness need to be identified as well as protective measures that need to be undertaken to mitigate those vulnerabilities. • Interdependencies within and between infrastructures need to be identified to minimize cascading effects. • The vulnerability assessment needs to take into account
  • 19. NORMALIZING, ANALYSING, AND PRIORITIZING STUDY RESULTS • The group of accumulating the vulnerability assessments needs to normalize the information from each subordinate section or staff, and then prioritize against all of the assets the higher organization is responsible for. • It will identify which areas offer the greatest risk and the best benefit from protective measures IMPLEMENTING PROTECTIVE PROGRAMS • The information gathered during the process will assist in developing and executing programs to protect or minimize damage to infrastructures. • The staff or organization can find assistance in developing programs from their agencies. e.g. Department of Homeland Security (DHS).
  • 20. MEASURING PERFORMANCE • Metrics need to be established for each protective measure to ensure they are being performed consistently, are sustainable and are effective. • Continuous review of the metrics will result in improvements to the framework and the protection plan
  • 21. Defence Critical Infrastructure Program Procedures DCIP risk management procedures for all critical infrastructures. The purpose of the DCIP is to ensure the availability of assets critical to all infrastructures. Once risks are assessed in all tasks and missions then possible responses can be reviewed and emplaced to ensure all missions will be accomplished no matter what actions are taken against an infrastructure. The DCIP Interim Implementation Guidance stresses that Risk management is cyclical, as changes are constantly made to systems and personnel are replaced, risks to infrastructures must be re-assessed.
  • 22. Criticality Risk Vulnerabilit Assessment Threats and y hazards Risk Management Remediation Risk Response Mitigation Reconstitution Defence Critical Infrastructure Program Procedures flow diagram
  • 23. Example: Department of Homeland Security • Officially established in January 2003. • The department’s mission is to help prevent terrorist attacks in the United States, reduce the country’s vulnerability to terrorism, and assist in recovery after an attack. • The department was created in response to the September 11, 2001, terrorist attacks against the World Trade Centre and the Pentagon as a way to oversee and coordinate security functions previously performed by dozens of different government. agencies.
  • 24. The department has four main divisions known as directorates, each administered by an undersecretary. • The Directorate of Border and Transportation Security is responsible for preventing terrorists from entering the United States; for protecting air, land, and sea transportation systems; and for enforcing immigration laws. • The Directorate of Emergency Preparedness and Response is responsible for coordinating the federal government’s response to terrorist attacks and major disasters and for assisting in recovery. • The Directorate of Science and Technology is charged with overseeing efforts to protect the United States from attacks involving chemical, biological, radiological, and nuclear weapons. It also conducts and funds research related to homeland security. • The Directorate of Information Analysis and Infrastructure Protection is responsible for analysing intelligence from a vast array of federal, state, and local agencies in order to detect terrorist threats and identify vulnerabilities in the
  • 25. SUPPORTING AGENCIES Many agencies assist the DHS in its mission. Primary responsibility for investigating and prosecuting acts of terrorism rests with law enforcement agencies, including the Department of Justice, the Federal Bureau of Investigation (FBI), and state and local law enforcement agencies. The CIA gathers overseas intelligence about terrorist threats. Other members of the intelligence community, such as the National Security Agency (NSA) and the Defence Intelligence Agency (DIA), also provide the DHS with information.
  • 26. References • http:/ / www. tsa. gov/ travelers/ highway/ index. shtm • http:/ / www. tsa. gov/ who_we_are/ index. shtm • Li, Hao et al. (2005-05). "Strategic Power Infrastructure Defense" (http:/ / www. science. smith. edu/ ~jcardell/ Readings/ TRUST US/ IEEE • http:/ / www. webcitation. org/ query?url=http:/ / www. geocities. com/ blohm/ NYTimes130504. htm/ & date=2009-10-25+ 13:43:27 • Massoud, Amin (2002-04). "Security Challenges for the Electricity Infrastructure (Supplement to Computer Magazine)". Computer (IEEE computer society) 35 (4): 8. doi:10.1109/MC.2002.10042. • http:/ / www. tswg. gov/ tswg/ ip/ ip_ma. Htm • DCSINT Handbook No. 1.02, Critical Infrastructure Threats and Terrorism • http:/ / www.wikipedia.com • Microsoft Encarta.