1. Hlsc 720-discussion 3-reply 2 | HLSC 720 – Critical Infrastructure:
The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES
THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.TEXTBOOK: Bennett, B.
T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical
infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN:
9781119237785.**JOHNATHAN**CARVER CARVER is a target Analysis and vulnerability
assessment system which utilizes both qualitative and quantitative procedures to identify,
interpret and determine the “Probability of Attack (PA) from an adversary against critical
infrastructure assets and/or key resources” (SMI, 2022, para 3). The CARVER acronym
consists of the following criteria: Criticality- Identifying key assets and
sectors. Accessibility- Determining ease of accessing these areas. Recoverability- How long
will it take to recover from a targeted attack or breach? Vulnerability- Security effectiveness
compared to the adversary’s capabilities. Effect- Magnitude and level of damage that would
occur from an attack or security breach. Recognizability- Identify the adversary’s ability to
identify and recognize targets as areas of critical infrastructure. CPTED Crime prevention
through environmental design (CPTED) is a system that implements environmental
conditions to enhance security measures to reduce and prevent criminal activity. CPTED’s
goals and objectives focus upon (1) controlling access; (2) providing visual enhancement;
(3) defining ownership; and (4) encouraging the maintenance of territory (AMFAM, 2023).
CPTED focuses upon crime prevention by utilizing natural elements, instead of ‘hardened
targeting’ measures. NIPP The Department of Homeland Security (DHS) defines the
National Infrastructure Protection Plan (NIPP) as a comprehensive risk management
framework that clearly defines critical infrastructure protection roles and responsibilities
within various federal sectors (DHS, 2023). Further, NIPP utilizes measures to defeat any
adversarial threat from any terror attack or minimize damage to critical infrastructure
stemming from a natural disaster or another emergency (DHS, 2023). CIKR Critical
Infrastructure and Key Resources (CIKR) describes policies, roles and responsibilities, and
the operational plan for “assessing, prioritizing, protecting, and restoring critical
infrastructure and key resources of the United States and its territories and possessions
during actual or potential domestic incidents” (CISA, 2023, para 1). SVA The purpose of a
Security Vulnerability Analysis (SVA) is to identify gaps in security measures and protocols
within an agency, company, etc… After these gaps and deficiencies are identified, then they
can be mitigated and/or eliminated. Vulnerabilities must be recognized to identify the most
likely target that can be exploited by an adversary. Examples include weak passwords
2. within an IT network, out-of-date computer protection, or inept security personnel. IDR The
Infrastructure Security Division’s Infrastructure Development and Recovery (IDR) program
works with all government levels with the goal of enhancing security measures and
strengthening the resilience Links to an external site.of critical infrastructure networks
against a variety of threats. Further, IDR assists government entities with implementing
security measures during all phases of operation, including the design, planning,
construction and maintenance. THIRA According to Bennett (2018), the Threat and Hazard
Identification and Risk Assessment Guide (THIRA) is a four-step process that consists of the
following: