Question

In: Operations Management

1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3...

1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3 examples.
2. In your own words, define critical infrastructure assessment (CIA) and the goals associated with CIA. Provide 3 examples.

Solutions

Expert Solution

1.
The Federal vigour Regulatory fee (FERC) authorised alterations and additions to important Infrastructure safeguard (CIP) Reliability specifications, often referred to as CIP v5, which can be a collection of specifications for securing the assets dependable for running the majority power method.
CIP is only one of 14 essential North American electric Reliability enterprise (NERC) requisites which are field to enforcement within the U.S. Nonetheless, it will get a great deal of attention because this regulation is centered on the bodily security and cybersecurity of belongings deemed to be relevant to the electricity infrastructure. Inside CIP, there are eleven reliability requisites currently subject to enforcement beneath CIP v5, but there are plans to introduce more in the future.
Obtaining compliance underneath CIP is more about coverage and approach than technological know-how. The businesses that aid the dependable entities attain CIP compliance aren't generally recognized to the public. Because cybersecurity standards for the energy sector are so new, there isn't a number of competitors.
Lots of the consultancies on this house have not often strayed external of important infrastructure. They are specialised, and have a variety of institutional advantage and earlier expertise with these varieties of techniques. Some well-known industrial providers are working within the house too, however most handiest sell products that deal with designated wishes beneath CIP.
After speakme with a number of specialists and people accustomed to CIP, as well as reading all of the NERC documentation, one factor grew to become clear: CIP isn't about technical controls. If technical controls are viewed, akin to an IP digital camera or a firewall, the effectiveness of said manage does not particularly come up.
CIP works on severity rankings with regards to scope: excessive, medium, and low. Like some other regulatory topic, scope is what ultimately determines a pass or fail with CIP.
As anticipated, entities that must agree to CIP will do all they can to diminish the overall scope, which makes earning compliance simpler. One informed, commenting on history, mentioned he is noticeable examples where an asset proprietor would not put into effect community protection monitoring, on account that doing so would broaden their regulatory footprint.
An additional example: An electrical supplier addressing the severity scores for their facility counted its buildings as separate property. Overall, the ability was generating more than 3,000 MW, which might designate them as excessive have an effect on. Considering that the organization had two buildings, with mills generating +/- 1500 MW each and every, it was once able to decrease its scope to medium affect. It failed to subject that each buildings were on the equal property, nor did it subject that both have been controlled from the equal manage room.
This shouldn't come as a shock. Lowering scope to obtain compliance is normal. Yet, when things are moved out of scope, there is a hazard of increasing one or more assaults. By using sticking to CIP, nonetheless, does the juggling of scope damage the total intention of protection? Now not fairly.
"The protection applications [at installations required to comply with CIP], work because of the layered protection controls. It's a security-in-depth mentality, and when you consider that the attack surfaces whilst significant are so few and so specialised, and so good-obfuscated, these safety programs work," said Phil Grimes, senior security guide with RedLegg safety offerings.
Grimes spent years helping entities running critical infrastructure corporations better understand their security posture and in some cases helped investigate CIP compliance. "CIP does work. That's why we haven't noticeable a primary breach within the U.S. Or Canada. We have now obvious this style of factor occur in other areas, but since of those protections, it's confirmed to work. But it surely's now not the tip all, be all."
So, after an entity achieves CIP compliance, where do the susceptible aspects still exist? CSO online requested Grimes to share some warfare reports, which we've outlined by section beneath. Nonetheless, there's an exciting crossover, as many of the problems Grimes outlined might also apply to organizations external of the power sector.

2.
The nation's crucial infrastructure supplies the main offerings that underpin American society and serve as the spine of our nation's financial system, protection, and wellbeing. We comprehend it as the energy we use in our houses, the water we drink, the transportation that strikes us, the shops we retailer in, and the conversation techniques we depend on to remain in contact with associates and loved ones.
Overall, there are sixteen principal infrastructure sectors that compose the belongings, techniques, and networks, whether physical or digital, so imperative to the USA that their incapacitation or destruction would have a debilitating outcome on safety, national monetary safety, country wide public health or security, or any combination thereof. The national safety and applications Directorate's office of Infrastructure safety (IP) leads the coordinated countrywide effort to manipulate risks to the nation's critical infrastructure and increase the security and resilience of the united states's bodily and cyber infrastructure


Related Solutions

1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3...
1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3 examples. 2. In your own words, define critical infrastructure assessment (CIA) and the goals associated with CIA. Provide 3 examples. 3. Using Chapter 9 of the Brown (2006) text, succinctly explain the primary purpose of Presidential Decision Directive 63 (PDD 63) 4. UsingChapter 10 of the Brown (2006) text, in your opinion, from a business perspective, is the Department of Homeland Security a necessary...
Explain Critical infrastructure vulnerability analysis its relationship to critical infrastructure protection:
Explain Critical infrastructure vulnerability analysis its relationship to critical infrastructure protection:
Define “republic” in your own words; include 3 references and provide an example
Define “republic” in your own words; include 3 references and provide an example
When answering the following questions, explain the relationship to critical infrastructure protection. Define each of the...
When answering the following questions, explain the relationship to critical infrastructure protection. Define each of the following related to information sharing: Need to Know, Sensitive But Unclassified (SBU) safeguards, For Official Use Only (FOUO), Critical Infrastructure Information (CII), Open-source information and intelligence, Clouds and concealed conduits, Freedom of Information Act (FOIA) exemptions, Enforcement of Section 214 of the Homeland Security Act.
1. Define misinformation and disinformation in your own words.
1. Define misinformation and disinformation in your own words.2. How does misinformation and disinformation spread online?3. Name two countries or regions in the world that monitor and try to curb disinformation4. Briefly explain their efforts. Name three countries where governments are working to spread disinformation? How do they spread the disinformation?
In your own words define and explain “marketing concept” and the “4P’s.” Provide an example of...
In your own words define and explain “marketing concept” and the “4P’s.” Provide an example of a company that uses one or both approaches. • Define “marketing” and “sales” and explain how they are different from one another. How are they dependent upon one another? • Does “marketing” have a function in church operations? Explain and support your answer. Generational trends lead to distinctly different attitudes, values, and behavioral patterns that must be considered when developing a market plan. •...
What are the three types of analytics? Define them in your own words and provide a...
What are the three types of analytics? Define them in your own words and provide a current real-world example of each. *I know what the three are ( descriptive, predictive and prescriptive) and I have already defined them, but what I need help with are the current real-world examples. Thanks.
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure....
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure. Why is it important to know Subnetting and VLSM? 2.) Explain Functions at the OSI and TCP/IP Model Layers.
What is the role of Homeland Security in critical infrastructure protection? give an example.
What is the role of Homeland Security in critical infrastructure protection? give an example.
Explain Risk management and risk analysis and their relationship to critical infrastructure protection.
Explain Risk management and risk analysis and their relationship to critical infrastructure protection.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT