Example: barber

Risk Management and Critical Infrastructure Protection ...

Congressional Research Service The library of CongressCRS Report for CongressReceived through the CRS WebOrder Code RL32561 Risk Management and Critical InfrastructureProtection: Assessing, Integrating, and ManagingThreats, Vulnerabilities and ConsequencesUpdated February 4, 2005 John MoteffSpecialist in Science and Technology PolicyResources, Science, and Industry DivisionRisk Management and Critical Infrastructure Protection :Assessing, Integrating, and Managing Threats,Vulnerabilities, and ConsequencesSummaryThe 9/11 Commission recommended that efforts to protect various modes oftransportation and allocation of federal assistance to state and local governmentsshould be based on an assessment of risk.

Feb 04, 2005 · Congressional Research Service ˜ The Library of Congress CRS Report for Congress Received through the CRS Web Order Code RL32561 Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences Updated February 4, 2005 John Moteff Specialist in Science and Technology Policy

Tags:

  Critical, Infrastructures, Management, Risks, Library, Risk management and critical infrastructure

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Risk Management and Critical Infrastructure Protection ...

1 Congressional Research Service The library of CongressCRS Report for CongressReceived through the CRS WebOrder Code RL32561 Risk Management and Critical InfrastructureProtection: Assessing, Integrating, and ManagingThreats, Vulnerabilities and ConsequencesUpdated February 4, 2005 John MoteffSpecialist in Science and Technology PolicyResources, Science, and Industry DivisionRisk Management and Critical Infrastructure Protection :Assessing, Integrating, and Managing Threats,Vulnerabilities, and ConsequencesSummaryThe 9/11 Commission recommended that efforts to protect various modes oftransportation and allocation of federal assistance to state and local governmentsshould be based on an assessment of risk.

2 In doing so, the Commission wasreiterating existing federal policy regarding the Protection of all the nation s criticalinfrastructures. The Homeland Security Act of 2002 ( 107-296) and otherAdministration documents have assigned the Department of Homeland Securityspecific duties associated with coordinating the nation s efforts to protect its criticalinfrastructure, including using a risk Management approach to set priorities. Manyof these duties have been delegated to the Information Analysis and InfrastructureProtection (IA/IP) assessment involves the integration of threat, vulnerability, andconsequence information. Risk Management involves deciding which protectivemeasures to take based on an agreed upon risk reduction strategy.

3 Manymodels/methodologies have been developed by which threats, vulnerabilities, andrisks are integrated and then used to inform the allocation of resources to reducethose risks . For the most part, these methodologies consist of the followingelements, performed, more or less, in the following order.!identify assets and identify which are most Critical !identify, characterize, and assess threats!assess the vulnerability of Critical assets to specific threats!determine the risk ( the expected consequences of specific typesof attacks on specific assets)!identify ways to reduce those risks !prioritize risk reduction measures based on a strategy The IA/IP Directorate has been accumulating a list of Infrastructure assets(specific sites and facilities).

4 From this list the Directorate is selecting assets thathave been judged to be Critical from a national point of view. The Directorateintends to assess the vulnerability of all the assets on this shorter list. According toDirectorate officials, vulnerability assessments and threat information are consideredwhen determining the risk each asset poses to the nation. This risk assessment isthen used to prioritize subsequent additional Protection activities. The IA/IPDirectorate s efforts to date, however, raise several concerns, ranging from theprocess and criteria used to populate its lists of assets, its prioritization strategy, andthe extent to which the Directorate is coordinating its efforts with the intelligencecommunity and other agencies both internal and external to the Department.

5 Thisreport will be updated as s Generic Model for Assessing and Integrating Threat, Vulnerability, and Risk ..4 Assessments ..4 Using Assessments to Identify and Prioritize Risk Reduction of DHS s Implementation of Its Critical Infrastructure Protection Effort ..13 Questions and Issues ..15 Identifying High Priority Assets ..19 Assessing Threat ..20 Assessing risks ..21 Risk Protection ..23 References ..251 The Intelligence Reform and Terrorism Prevention Act of 2004 (S. 2845, 108-458),legislating some of the recommendations of the Commission s report, included arequirement to develop a National Strategy for Transportation Security that includes thedevelopment of risk-based priorities.

6 Risk Management and Critical InfrastructureProtection: Assessing, Integrating, andManaging Threats, Vulnerabilities, andConsequencesIntroductionAs part of its chapter on a global strategy for protecting the United States againstfuture terrorist attacks, the 9/11 Commission recommended that efforts to protectvarious modes of transportation and allocation of federal assistance to state and localgovernments should be based on an assessment of In doing so, theCommission was affirming existing federal policy regarding the Protection of all thenation s Critical infrastructures . The Homeland Security Act of 2002 and otherAdministration documents have assigned the Department of Homeland Securityspecific duties associated with coordinating the nation s efforts to protect its criticalinfrastructure.

7 Many of these duties have been delegated to the Information Analysisand Infrastructure Protection (IA/IP) Directorate. In particular, the IA/IP Directorateis to integrate threat assessments with vulnerability assessments in an effort toidentify and manage the risk associated with possible terrorist attacks on the nation scritical Infrastructure . By doing so, the Directorate is to help the nation set prioritiesand take cost-effective protective report is meant to support congressional oversight by discussing, in moredetail, what this task entails and issues that need to be addressed. In particular, thereport defines terms ( threat, vulnerability, and risk), discusses how they fittogether in a systematic analysis, describes processes and techniques that have beenused to assess them, and discusses how the results of that analysis can informresource allocation and the IA/IP Directorate has been given this task as one of its primarymissions, similar activities are being undertaken by other agencies under otherauthorities and by the private sector and states and local governments.

8 Therefore,this report also discusses the Department s role in coordinating and/or integratingthese activities. CRS-22 Office of Homeland Security, National Strategy for Homeland Security, July Ibid. p. Ibid. p. s ResponsibilitiesThe Homeland Security Act of 2002 and other Administration documents haveassigned the Department of Homeland Security specific duties associated withcoordinating the nation s efforts to protect its Critical Infrastructure . Many of theduties discussed below have been delegated to the Information Analysis andInfrastructure Protection National Strategy for Homeland Security,2 anticipating the establishmentof the Department of Homeland Security, stated: !

9 The Department would build and maintain a complete, current,and accurate assessment of vulnerabilities and preparedness ofcritical targets across Critical Infrastructure [Thisassessment will] guide the rational long-term investment of effortand ! .. we must carefully weigh the benefit of each homeland securityendeavor and only allocate resources where the benefit of reducingrisk is worth the amount of additional Among the specific tasks delegated to the Undersecretary for InformationAnalysis and Infrastructure Protection by Section 201(d) of the Homeland SecurityAct of 2002 ( 107-296, enacted November 25, 2002) were:! .. identify and assess the nature and scope of terrorist threats to thehomeland; !

10 Understand such threats in light of actual and potentialvulnerabilities of the homeland; ! .. carry out comprehensive assessments of the vulnerabilities of thekey resources and Critical infrastructures of the United States,including the performance of risk assessments to determine the riskposed by particular types of terrorist attacks within the United ! .. integrate relevant information, analyses, and vulnerabilityassessments .. in order to identify priorities for protective andsupport measures .. ! .. develop a comprehensive national plan for securing the keyresources and Critical Infrastructure of the United States .. ! .. recommend measures necessary to protect the key resources andcritical Infrastructure of the United States.