SlideShare a Scribd company logo
1) Responded to message below. Should be at minimum of 250
words include direct discussion of the main points, answers, and
question. Include at least 2 APA-cited references.
According to “Presidential Policy Directive 21 (PPD-21)
Critical Infrastructure Security and Resilience”, there are 16
critical infrastructure sectors that are considered critical to the
safety, security and success of the United States. Each of these
sixteen sectors has a designated lead agency, which is in charge
of safeguarding their assigned sector. As part of these
responsibilities, the agency in charge of each sector creates a
plan that incorporates the National Infrastructure Protection
Plan’s risk management framework in order to safeguard these
vital areas. There are numerous sectors that cover everything
from nuclear power plants, to money to agriculture. We will
discuss three of these sectors in more detail (DHS, 2017).
The first sector includes Water and Wastewater systems and is
focused on safe drinking water and the proper treatment of our
wastewater. Water is critical to any civilization and the
safeguarding and oversight of this resource is critical to our
public health. The lead agency for this sector is the
Environmental Protection Agency (EPA). While the EPA most
definitely plays a role in safeguarding our drinking and Waste
Water, there are a number of other agencies that could be
involved in this sector including the Department of Health and
Human Services (DHHS). Since the mission of DHHS is directly
tied to enhancing and protecting the health and well being of all
Americans, I can see the large role they could potentially play
in this sector. While the EPA may be better suited to deal with
some of the environmental factors associated with this sector, I
feel that the DHHS may be better suited to protect the public
health and prevent disease.
The Nuclear Reactors, Materials, and Waste sector is overseen
by the Department of Homeland Security and is focused on
maintaining the security of the nation’s nuclear assets. This
sector includes oversight of more than 150 nuclear facilities,
radioactive materials used in medical, commercial, and
academic areas as well as shipments of nuclear waste. I think
the Department of Homeland Security is the best choice to lead
this sector but I also feel that the Department of Energy should
also be involved in oversight of this sector since they are the
primary agency physically protecting most of the nuclear sites
in the U.S. and are responsible for many of the individual
nuclear sites. The Department of Energy is the lead agency for
the Energy sector and their expertise could be leveraged to
better implement risk management initiatives and increase the
resilience of the nuclear infrastructure (DOE, 2017).
The third sector is the Information Technology sector which has
become increasingly critical to the overall security and
prosperity of the United States over the last fifteen to twenty
years. This sector is so vital because information technology is
used in every other sector and therefore requires maximum
protection. However, the ever changing nature of the threats
facing this sector make it difficult to prevent all attacks, even
with a well-coordinated risk management plan in place.
Currently, the Department of Homeland Security is the lead
agency for this sector and to their credit they have implemented
many programs to strengthen this sector since the release of the
2013 National Infrastructure Protection Plan (NIPP). The NIPP
is obviously focused on protecting critical infrastructure but
more specifically; it lays out how government and private sector
entities should work together to achieve this goal. The steps
that the Department of Homeland Security has taken have been
positive but due to the significance of information technology
and the multiple vulnerabilities it contains, I think this sector
should be co-lead by the Department of Defense. The
Department of Defense’s robust capabilities and focus on
cyberspace makes them uniquely suited to be involved in this
endeavor. While the Department of Defense is the lead agency
for the Defense Industrial sector, the large amount of cyber
attacks and intrusions aimed at the United States’ critical
infrastructure, many of which originate from foreign military
cyber units, make their involvement relevant and necessary
(DHS, 2013).
2) Responded to message below. Should be at minimum of 250
words include direct discussion of the main points, answers, and
question. Include at least 2 APA-cited references.
The United States government as defined the term critical
infrastructure as a network of independent, man-made systems
that are provided by both private and public sectors. These
infrastructures produce and distribute good and services are
essential to the national security, economic prosperity, and
quality of life to all citizens of the United States. There are
eight critical infrastructures that the United States and other
nations rely on for day to day operations: transportation, oil and
gas production and storage, water supply, emergency services,
government services, banking and finance, electrical power, and
telecommunications. <w:sdt> (Marsh, 1997)
Transportation sector is governed and regulated by the U.S
Department of Transportation (DOT). The three modes of
transportation that are used are vehicles operated on land,
aircraft and airplanes, and ships and boats. The DOT is overall
responsible for all means use to transport of all raw material,
manufactured goods, food, and consumable supplies meant that
is imported and exported within the United States. In 1995 it
contributed to $777 billion of dollars or 11 percent of the U.S.
Gross Domestic Product (GPD) for the nation’s economy. The
agencies that assist the DOT with this responsible are the Office
of the Secretary of Transportation (OST), the Federal Aviation
Administration (FAA), the Federal Highway Administration
(FHWA), the Federal Transit Administration (FTA), the Federal
Railroad Administration (FRA), the United States Coast Guard
(USCG), the Maritime Administration (MARAD), and the
Research and Special Programs Administration (RSPA)
<w:sdt> (Marsh, 1997).
provides security and operations at 328 ports of entry
throughout the country. This agency controls the flow of people,
raw material, and goods that enter that enter the United States
from all land entry points, seaports, and airports. They help
control the flow of illegal drugs, firearms, and other
contrabands from entering the United States. The agencies that I
believe should be involved with the Department of
Transportation are the U.S. the Custom and Border Protection
(CBP). This agency <w:sdt>(U.S. Border and Custom
Protection, 2017)
The Environmental Protection Agency (EPA) is responsible for
protecting the United States’ water supply. The EPA ensure the
quality of water is safe for plants, animals, and human
consummation from highly toxic chemical and biological agents
and free of water contamination by using technology to
detecting, identifying, measuring the parts per million (ppm) in
the water source, and treating the water supply from reservoirs,
water holding facilities, aqueducts, and other transport systems.
Private and Public Research and Development (R&D) assist the
EPA with researching and developing technologies and products
that increase the efficiency and methods used to protect the
United States water supply from being contaminated. <w:sdt>
(Marsh, 1997)
Today advancements in telecommunications has increased the
speed, efficiency and effectiveness of information and
networking being shared through computers and other digital
communications, Networking has allowed electronic transfer of
funds, the distribution of electrical power, and the control of
gas and oil pipeline systems. The agencies that assist the DOD
and DOC with this responsible are the Federal Communication
Commission (FCC), all the military branches of the DOD,
private and public agencies that develops software, computer
programs, and train Information Technology (IT) operators to
protect out telecommunications from cyber attacks. The
telecommunications infrastructure is used to send information
through many outlets by using the Public Telecommunications
Network (PTN), the Internet, for personal, commercial,
academic, and government use. The Department of Defense
(DOD) & Department of Commerce (DOC) are the United States
government departments that are responsible for protecting the
telecommunication sector. <w:sdt>(Marsh, 1997)
Number of Pages: 2 Pages

More Related Content

Similar to 1) Responded to message below. Should be at minimum of 250 words i.docx

ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
ETDAofficialRegist
 
Charless Initial ResponseCharles B. FreitagHelms School o
Charless Initial ResponseCharles B. FreitagHelms School oCharless Initial ResponseCharles B. FreitagHelms School o
Charless Initial ResponseCharles B. FreitagHelms School o
JinElias52
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docx
juliennehar
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
David Sweigert
 
Annotated BibliographyThere are 2 .docx
Annotated BibliographyThere are 2 .docxAnnotated BibliographyThere are 2 .docx
Annotated BibliographyThere are 2 .docx
tarifarmarie
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docx
hanneloremccaffery
 
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docxWeek 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
cockekeshia
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docx
ShiraPrater50
 
From Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInterFrom Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInter
JeanmarieColbert3
 
Transitpresentationmarch2012
Transitpresentationmarch2012Transitpresentationmarch2012
Transitpresentationmarch2012
jonathansherman
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
alfredacavx97
 
ITS National Update 2011 3-01-11 SIU
ITS National Update 2011  3-01-11 SIUITS National Update 2011  3-01-11 SIU
ITS National Update 2011 3-01-11 SIUraymurphy9533
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
David Sweigert
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
Jennifer Reither
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
alanfhall8953
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
Rama Reddy
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSS. F. (Sid) Nash
 
Governing autonomous vehicles emerging responses for safety liability privacy...
Governing autonomous vehicles emerging responses for safety liability privacy...Governing autonomous vehicles emerging responses for safety liability privacy...
Governing autonomous vehicles emerging responses for safety liability privacy...
Araz Taeihagh
 
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
gulangyu9521
 

Similar to 1) Responded to message below. Should be at minimum of 250 words i.docx (20)

Prof E Hewitt
Prof  E HewittProf  E Hewitt
Prof E Hewitt
 
ASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection FrameworkASEAN Critical Information Infrastructure Protection Framework
ASEAN Critical Information Infrastructure Protection Framework
 
Charless Initial ResponseCharles B. FreitagHelms School o
Charless Initial ResponseCharles B. FreitagHelms School oCharless Initial ResponseCharles B. FreitagHelms School o
Charless Initial ResponseCharles B. FreitagHelms School o
 
Title United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docxTitle United States. The National Strategy for Homeland Security .docx
Title United States. The National Strategy for Homeland Security .docx
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
 
Annotated BibliographyThere are 2 .docx
Annotated BibliographyThere are 2 .docxAnnotated BibliographyThere are 2 .docx
Annotated BibliographyThere are 2 .docx
 
Gabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docxGabriel HarrellExplain the specific security challenges in the P.docx
Gabriel HarrellExplain the specific security challenges in the P.docx
 
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docxWeek 5 – Critical Infrastructure (Local Level)In last week’s les.docx
Week 5 – Critical Infrastructure (Local Level)In last week’s les.docx
 
47Critical Infrastructure Protection, Emergency Respon.docx
  47Critical Infrastructure Protection, Emergency Respon.docx  47Critical Infrastructure Protection, Emergency Respon.docx
47Critical Infrastructure Protection, Emergency Respon.docx
 
From Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInterFrom Awareness to Action Accounting for InfrastructureInter
From Awareness to Action Accounting for InfrastructureInter
 
Transitpresentationmarch2012
Transitpresentationmarch2012Transitpresentationmarch2012
Transitpresentationmarch2012
 
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docxMARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
MARITIME CRITICAL INFRASTRUCTURE PROTECTION DHS .docx
 
ITS National Update 2011 3-01-11 SIU
ITS National Update 2011  3-01-11 SIUITS National Update 2011  3-01-11 SIU
ITS National Update 2011 3-01-11 SIU
 
Marriage of Cyber Security with Emergency Management - Congress
Marriage of Cyber Security with Emergency Management  - CongressMarriage of Cyber Security with Emergency Management  - Congress
Marriage of Cyber Security with Emergency Management - Congress
 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETSSEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
SEWERLOCK AND TELECOMLOCK INFRASTRUCTURE ASSETS
 
Governing autonomous vehicles emerging responses for safety liability privacy...
Governing autonomous vehicles emerging responses for safety liability privacy...Governing autonomous vehicles emerging responses for safety liability privacy...
Governing autonomous vehicles emerging responses for safety liability privacy...
 
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
500 13031111 r1-_gsc_tf_report_on_emergency_communications_v012_rev5
 

More from SONU61709

Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docxPlease respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
SONU61709
 
Please respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docxPlease respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docx
SONU61709
 
Please respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docxPlease respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docx
SONU61709
 
Please respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docxPlease respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docx
SONU61709
 
Please respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docxPlease respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docx
SONU61709
 
Please respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docxPlease respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docx
SONU61709
 
Please respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docxPlease respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docx
SONU61709
 
Please respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docxPlease respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docx
SONU61709
 
Please respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docxPlease respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docx
SONU61709
 
Please respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docxPlease respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docx
SONU61709
 
Please respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docxPlease respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docx
SONU61709
 
Please respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docxPlease respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docx
SONU61709
 
Please respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docxPlease respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docx
SONU61709
 
please respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docxplease respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docx
SONU61709
 
please respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docxplease respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docx
SONU61709
 
Please respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docxPlease respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docx
SONU61709
 
Please respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docxPlease respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docx
SONU61709
 
Please respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docxPlease respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docx
SONU61709
 
Please respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docxPlease respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docx
SONU61709
 
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docxPlease respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
SONU61709
 

More from SONU61709 (20)

Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docxPlease respond to the followingAnalyze ONE of the Neo-Piageti.docx
Please respond to the followingAnalyze ONE of the Neo-Piageti.docx
 
Please respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docxPlease respond to the followingBased on the discussion prepar.docx
Please respond to the followingBased on the discussion prepar.docx
 
Please respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docxPlease respond to the following in an approx. 5-6 page paper, double.docx
Please respond to the following in an approx. 5-6 page paper, double.docx
 
Please respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docxPlease respond to the followingImagine you have recently .docx
Please respond to the followingImagine you have recently .docx
 
Please respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docxPlease respond to one (1) the followingRead the article e.docx
Please respond to one (1) the followingRead the article e.docx
 
Please respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docxPlease respond to the followingResearch on the Internet a rec.docx
Please respond to the followingResearch on the Internet a rec.docx
 
Please respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docxPlease respond to Question One (bolded) and one additional ess.docx
Please respond to Question One (bolded) and one additional ess.docx
 
Please respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docxPlease respond to the following in a substantive post (3–4 paragraph.docx
Please respond to the following in a substantive post (3–4 paragraph.docx
 
Please respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docxPlease respond to the followingDebate if failing to reje.docx
Please respond to the followingDebate if failing to reje.docx
 
Please respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docxPlease respond to the followingCharts and graphs are used.docx
Please respond to the followingCharts and graphs are used.docx
 
Please respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docxPlease respond to the followingAppraise the different approac.docx
Please respond to the followingAppraise the different approac.docx
 
Please respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docxPlease respond to the following discussion with a well thought out r.docx
Please respond to the following discussion with a well thought out r.docx
 
Please respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docxPlease respond to each classmate if there is a need for it and als.docx
Please respond to each classmate if there is a need for it and als.docx
 
please respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docxplease respond to both discussion in your own words in citation plea.docx
please respond to both discussion in your own words in citation plea.docx
 
please respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docxplease respond In your own words not citations1. The Miami blu.docx
please respond In your own words not citations1. The Miami blu.docx
 
Please respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docxPlease respond in 300 words the followingWe see SWOT present.docx
Please respond in 300 words the followingWe see SWOT present.docx
 
Please respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docxPlease respond to the followingReflect on the usefulness .docx
Please respond to the followingReflect on the usefulness .docx
 
Please respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docxPlease respond to the followingLeadership talent is an or.docx
Please respond to the followingLeadership talent is an or.docx
 
Please respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docxPlease respond to the followingHealth care faces critic.docx
Please respond to the followingHealth care faces critic.docx
 
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docxPlease respond to the followingMNCs, IOs, NGOs, and the E.docx
Please respond to the followingMNCs, IOs, NGOs, and the E.docx
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

1) Responded to message below. Should be at minimum of 250 words i.docx

  • 1. 1) Responded to message below. Should be at minimum of 250 words include direct discussion of the main points, answers, and question. Include at least 2 APA-cited references. According to “Presidential Policy Directive 21 (PPD-21) Critical Infrastructure Security and Resilience”, there are 16 critical infrastructure sectors that are considered critical to the safety, security and success of the United States. Each of these sixteen sectors has a designated lead agency, which is in charge of safeguarding their assigned sector. As part of these responsibilities, the agency in charge of each sector creates a plan that incorporates the National Infrastructure Protection Plan’s risk management framework in order to safeguard these vital areas. There are numerous sectors that cover everything from nuclear power plants, to money to agriculture. We will discuss three of these sectors in more detail (DHS, 2017). The first sector includes Water and Wastewater systems and is focused on safe drinking water and the proper treatment of our wastewater. Water is critical to any civilization and the safeguarding and oversight of this resource is critical to our public health. The lead agency for this sector is the Environmental Protection Agency (EPA). While the EPA most definitely plays a role in safeguarding our drinking and Waste Water, there are a number of other agencies that could be involved in this sector including the Department of Health and Human Services (DHHS). Since the mission of DHHS is directly tied to enhancing and protecting the health and well being of all Americans, I can see the large role they could potentially play in this sector. While the EPA may be better suited to deal with some of the environmental factors associated with this sector, I feel that the DHHS may be better suited to protect the public health and prevent disease.
  • 2. The Nuclear Reactors, Materials, and Waste sector is overseen by the Department of Homeland Security and is focused on maintaining the security of the nation’s nuclear assets. This sector includes oversight of more than 150 nuclear facilities, radioactive materials used in medical, commercial, and academic areas as well as shipments of nuclear waste. I think the Department of Homeland Security is the best choice to lead this sector but I also feel that the Department of Energy should also be involved in oversight of this sector since they are the primary agency physically protecting most of the nuclear sites in the U.S. and are responsible for many of the individual nuclear sites. The Department of Energy is the lead agency for the Energy sector and their expertise could be leveraged to better implement risk management initiatives and increase the resilience of the nuclear infrastructure (DOE, 2017). The third sector is the Information Technology sector which has become increasingly critical to the overall security and prosperity of the United States over the last fifteen to twenty years. This sector is so vital because information technology is used in every other sector and therefore requires maximum protection. However, the ever changing nature of the threats facing this sector make it difficult to prevent all attacks, even with a well-coordinated risk management plan in place. Currently, the Department of Homeland Security is the lead agency for this sector and to their credit they have implemented many programs to strengthen this sector since the release of the 2013 National Infrastructure Protection Plan (NIPP). The NIPP is obviously focused on protecting critical infrastructure but more specifically; it lays out how government and private sector entities should work together to achieve this goal. The steps that the Department of Homeland Security has taken have been positive but due to the significance of information technology and the multiple vulnerabilities it contains, I think this sector should be co-lead by the Department of Defense. The Department of Defense’s robust capabilities and focus on
  • 3. cyberspace makes them uniquely suited to be involved in this endeavor. While the Department of Defense is the lead agency for the Defense Industrial sector, the large amount of cyber attacks and intrusions aimed at the United States’ critical infrastructure, many of which originate from foreign military cyber units, make their involvement relevant and necessary (DHS, 2013). 2) Responded to message below. Should be at minimum of 250 words include direct discussion of the main points, answers, and question. Include at least 2 APA-cited references. The United States government as defined the term critical infrastructure as a network of independent, man-made systems that are provided by both private and public sectors. These infrastructures produce and distribute good and services are essential to the national security, economic prosperity, and quality of life to all citizens of the United States. There are eight critical infrastructures that the United States and other nations rely on for day to day operations: transportation, oil and gas production and storage, water supply, emergency services, government services, banking and finance, electrical power, and telecommunications. <w:sdt> (Marsh, 1997) Transportation sector is governed and regulated by the U.S Department of Transportation (DOT). The three modes of transportation that are used are vehicles operated on land, aircraft and airplanes, and ships and boats. The DOT is overall responsible for all means use to transport of all raw material, manufactured goods, food, and consumable supplies meant that is imported and exported within the United States. In 1995 it contributed to $777 billion of dollars or 11 percent of the U.S. Gross Domestic Product (GPD) for the nation’s economy. The
  • 4. agencies that assist the DOT with this responsible are the Office of the Secretary of Transportation (OST), the Federal Aviation Administration (FAA), the Federal Highway Administration (FHWA), the Federal Transit Administration (FTA), the Federal Railroad Administration (FRA), the United States Coast Guard (USCG), the Maritime Administration (MARAD), and the Research and Special Programs Administration (RSPA) <w:sdt> (Marsh, 1997). provides security and operations at 328 ports of entry throughout the country. This agency controls the flow of people, raw material, and goods that enter that enter the United States from all land entry points, seaports, and airports. They help control the flow of illegal drugs, firearms, and other contrabands from entering the United States. The agencies that I believe should be involved with the Department of Transportation are the U.S. the Custom and Border Protection (CBP). This agency <w:sdt>(U.S. Border and Custom Protection, 2017) The Environmental Protection Agency (EPA) is responsible for protecting the United States’ water supply. The EPA ensure the quality of water is safe for plants, animals, and human consummation from highly toxic chemical and biological agents and free of water contamination by using technology to detecting, identifying, measuring the parts per million (ppm) in the water source, and treating the water supply from reservoirs, water holding facilities, aqueducts, and other transport systems. Private and Public Research and Development (R&D) assist the EPA with researching and developing technologies and products that increase the efficiency and methods used to protect the United States water supply from being contaminated. <w:sdt> (Marsh, 1997) Today advancements in telecommunications has increased the speed, efficiency and effectiveness of information and
  • 5. networking being shared through computers and other digital communications, Networking has allowed electronic transfer of funds, the distribution of electrical power, and the control of gas and oil pipeline systems. The agencies that assist the DOD and DOC with this responsible are the Federal Communication Commission (FCC), all the military branches of the DOD, private and public agencies that develops software, computer programs, and train Information Technology (IT) operators to protect out telecommunications from cyber attacks. The telecommunications infrastructure is used to send information through many outlets by using the Public Telecommunications Network (PTN), the Internet, for personal, commercial, academic, and government use. The Department of Defense (DOD) & Department of Commerce (DOC) are the United States government departments that are responsible for protecting the telecommunication sector. <w:sdt>(Marsh, 1997) Number of Pages: 2 Pages