Summarize and discuss information sharing and protection

Assignment Help Humanities
Reference no: EM131386632

Summarize and discuss Information Sharing and Protection

POST

Information Sharing and Protection is a vital part of the National Infrastructure Protection Plan (NIPP) and the Guide for CIKR at the State, Regional, and Local Levels (Sept 2008) gives direction on how to accomplish this. All levels are considered including regions, state, local, and private sectors. This discussion will look at the guidance on how information concerning CIKR should be shared, fusion centers' roles in the protection of CIKR, and then how CIKR information should be protected.

Owners and operators of CIKR assets have a vested interest in keeping their investments from harm. Private sector individuals and companies want their facilities and personnel protected while at the same time cannot afford to waste limited resources on every possible threat they may face. Partnership with the federal government grants them a much better picture of what is the current threat level in their locality/localities and what types of threat level their industry is facing on a whole. States and local governments are well suited to act as the go-between in the vital communication processes between federal agencies and owners and operators.

The federal government also benefits by gaining insight into what types of intelligence products would most benefit owners and operators as well as any reports on suspicious activity they may have observed. One important tool used in this exchange of information sharing is the Homeland Security Information Network (HSIN). Its network is designed off of previous lessons learned from the Department of Defense (DoD) and other federal organizations (DHS, 2008, pp. 23-24). While an unclassified network, it is still a secured network due to the sharing of Sensitive But Unclassified Information on it and allows many capabilities including alerts, training, Global Information Systems mapping, secure messaging, instant messaging, web conferencing, and document storage (DHS, 2016, paras. 1-2).

Fusion centers are one method utilized by states (along with other governmental agencies such as the two Maritime Intelligence Fusion Centers utilized and operated by the US Coast Guard (Richardt, 2006, pp. 8-9)) to act as enablers of the conduits of information flowing amongst the protectors of CIKR. Fusion centers may also develop their own intelligence analysis and reports in addition to acting as "all source" clearinghouses (Sauter and Carafano, 2012, p. 176) and providing increased understanding of threats, vulnerabilities, and consequences of disasters or attacks on CIKR within their area of responsibility. Furthermore, fusion centers should be funded and equipped with resources that allow them to not only collect and share CIKR information accordingly but also to share best practices, standard operating procedures, and emergency information necessary for all levels including owners and operators (DHS, 2008, pp. 24-25).

Information protection is the last area that is addressed in the realm of information sharing and protection in the DHS guide for CIKR. While it is vital that information gets in a timely manner to those levels and organizations that have the desire or even duty to protect CIKR assets, it is also extremely vital to exclude those that would use such information for nefarious purposes and those that might discuss or disclose CIKR information unknowingly or haphazardly (those without a "need to know"). DHS reminds all levels involved in information sharing that everyone involved is responsible for protecting information about CIKR and reiterates that every plan and program should contain information detailing who is granted access to the information and how they obtain that restricted access. A program that exists to help safeguard information is the Protected Critical Infrastructure Information (PCII) Program.

This information may include personal identifying information, vulnerability reports, risks, threats, asset identifiers, and proprietary information for private industry. The PCII program acts in that if the information is shared with the government and validated as qualifying as PCII, it gains protection from federal law and then becomes exempt from public disclosure. A final category of CIKR has gained its own new specific standards under federal law. Chemical facilities now operated under the Chemical Facility Anti-Terrorism Standards. Chemical-terrorism Vulnerability Information is generated and utilized to meet those standards and to share information at the local and state levels to help ensure that the chemical facilities are adequately safeguarded (DHS, 2008, pp. 25-27).

Information about CIKR must be appropriately shared while at the same time protected against those that would exploit it to attack our homeland. Systems and tools such as the HSIN and fusion centers have been developed to allow easy access, storage of information, analysis of threats and vulnerabilities, and collaboration amongst the many partners involved in protecting CIKR. As we have recently seen in this last election year, even government systems and networks used by politicians and members of our federal government are not immune from attack and penetration by individual hackers, hackers acting on the behalf of foreign governments, or trusted individuals that leak information knowingly (or even unknowingly). DHS has recognized that CIKR information must be protected and given guidance and tools such as the HSIN to help meet that goal.

1 PAGE

Reference no: EM131386632

Questions Cloud

Explain who will prevail in given situation : The plaintiffs' estates brought this action against the defendant for breach of warranty, and the defendant raised the defense of the plaintiffs' voluntary assumption of the risk. Explain who will prevail.
Compute firms prices-market outcome in the nash equilibrium : Suppose that firm 1 and firm 2 operate under conditions of constant average and marginal cost but that firm 1’s marginal cost is c1 = 10 and firm 2’s marginal cost c2 = 8. Market demand is Q = 500 − 20P. Compute firms’ prices, profit and market outco..
Describe the specific security concerns or risks : Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one presents.
Has giant breached its implied warranty of merchantability : The explosion caused him to lose his balance and fall, with injuries resulting. Has Giant breached its implied warranty of merchantability to Seigel? Why?
Summarize and discuss information sharing and protection : Information Sharing and Protection is a vital part of the National Infrastructure Protection Plan (NIPP) and the Guide for CIKR at the State, Regional, and Local Levels (Sept 2008) gives direction on how to accomplish this. All levels are consider..
What recourse if any does ben have : Two weeks after Ben purchased the mower, the police arrived at his house with Owen Owner, the true owner of the lawn mower, which was stolen from his yard, and reclaimed the mower. What recourse, if any, does Ben have?
Is it a requirement to have a local dns server : Is it a requirement to have a local DNS server? Please provide a example and maybe a citied source please?
Industries in simple economy producing commodities : There are two industries in a simple economy producing commodities x and y. Industry x produces with constant long run cost. The government levies a per unit tax on industry x of tx. Graphically analyze the short and the long run effects of this tax ..
Explain cyber warfare is defined : Explain Cyber warfare is defined as, "Internet-based conflict involving politically motivated attacks on information and information systems. Cyberwarfare attacks can disable official websites and networks, disrupt or disable essential services, s..

Reviews

Write a Review

Humanities Questions & Answers

  How does benthams concept of pleasure differ from mill

How does Benthams concept of pleasure differ from Mill's - For what reasons can we imagine that Bentham's theory was regarded as scandalous in its day?

  Do you think we can infer moral laws of human conduct

In your own WORDS or OPINION, do you think we can infer moral laws of human conduct out of our study and understanding of nature? Why or why not?

  Experiences with persuasive writingdescribe experiences you

experiences with persuasive writingdescribe experiences you have had with persuasive writing writing to

  Factors influence potential customers

A large supermarket chain would like to know what factors influence potential customers to come to their supermarkets. They have asked you to investigate this and build a regression model to estimate the number of customers that use any one of the..

  Is the curve linear or nonlinear

Plot power versus current for a 100-Ω resistor. Use a power scale from 0 to 1 W and a current scale from 0 to 100 mA with divisions of 0.1 W and 10 mA, respectively.

  Discuss the influence of social media on middle age audlts

Discuss the influence of social media on middle age and senior adults. Support your views with one or two reasons and/or examples.Discuss effects of social media on your relationship and communication with others. Support your reflections with one..

  What is the error probability at the destination

X is a binary memoryless source with P(X = 0) = 0.3. This source is transmitted over a binary symmetric channel with crossover probability p = 0.1.

  The companys annual accounting period ends on december 31

meyer co. follows the practice of recording prepaid expenses and unearned revenues in balance sheet accounts. the

  Write memo about journal or periodical in health care field

Write a memo about a journal or periodical in the health care field.- tell me about your findings about professional writing in the health care field.

  Analyze effects of intraregional and interregional migration

What pull factors are likely to help the city of Sault Ste. Marie attract people from other parts of Ontario and Canada to boost its population base in the next 10 years - Analyze the effects of intraregional and interregional migration as agents o..

  Discuss about the evaluation of the program

Program evaluation is the use of social research methods and techniques to analyze public programs. It is a relatively young discipline and came into its own most notably in the ‘60s and ‘70s. The analyses of social program initiatives in the cont..

  How nurse would demonstrate leadership in given situations

Nurses demonstrate leadership in many situations. - how the nurse would demonstrate leadership in given situation:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd