World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Crs Report for Congress Received through the Crs Web Risk Management and Critical Infrastructure Protection : Assessing, Integrating, And Managing Threats, Vulnerabilities and Consequences Updated February 4, 2005

By Moteff, John

Click here to view

Book Id: WPLBN0000202497
Format Type: PDF eBook
File Size: 0.2 MB
Reproduction Date: 2008
Full Text

Title: Crs Report for Congress Received through the Crs Web Risk Management and Critical Infrastructure Protection : Assessing, Integrating, And Managing Threats, Vulnerabilities and Consequences Updated February 4, 2005  
Author: Moteff, John
Volume:
Language: English
Subject: Government publications, Legislation., Government Printing Office (U.S.)
Collections: Government Library Collection
Historic
Publication Date:
Publisher: Government Printing Office

Citation

APA MLA Chicago

Moteff, J. D. (n.d.). Crs Report for Congress Received through the Crs Web Risk Management and Critical Infrastructure Protection : Assessing, Integrating, And Managing Threats, Vulnerabilities and Consequences Updated February 4, 2005. Retrieved from http://hawaiilibrary.net/


Excerpt
Summary: The 9/11 Commission recommended that efforts to protect various modes of transportation and allocation of federal assistance to state and local governments should be based on an assessment of risk. In doing so, the Commission was reiterating existing federal policy regarding the protection of all the nation’s critical infrastructures. The Homeland Security Act of 2002 (P.L. 107-296) and other Administration documents have assigned the Department of Homeland Security specific duties associated with coordinating the nation’s efforts to protect its critical infrastructure, including using a risk management approach to set priorities. Many of these duties have been delegated to the Information Analysis and Infrastructure Protection (IA/IP) Directorate. ...

Table of Contents
Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 IA/IP’s Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 A Generic Model for Assessing and Integrating Threat, Vulnerability, and Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Using Assessments to Identify and Prioritize Risk Reduction Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Status of DHS’s Implementation of Its Critical Infrastructure Protection Effort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Questions and Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Identifying Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Selecting High Priority Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Assessing Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Assessing Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Assessing Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Risk Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Prioritizing Protection Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

 

Click To View

Additional Books


  • General Management : Treasury Employees ... (by )
  • United States Department of State Patter... (by )
  • American Terrorism Study : Patterns of B... (by )
  • All Necessary Means : Employing Cia Oper... (by )
  • Military Transformation: Intelligence, S... (by )
  • Crs Report for Congress Received through... (by )
  • The Global War on Terrorism (by )
  • Possible Impacts of Major Counter Terror... (by )
  • Cisco's Mobile Ipv4 Host Configuration E... (by )
  • Agroterrorism : Threats and Preparedness (by )
  • Insurers Appear Prepared to Recover Crit... (by )
  • U.S. Policy on Counterterrorism (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.