glass
pen
clip
papers
heaphones

The thread must be a minimum of 200-400 words

The thread must be a minimum of 200-400 words

The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.

TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.

**JOHNATHAN**

CARVER 

CARVER is a target Analysis and vulnerability assessment system which utilizes both qualitative and quantitative procedures to identify, interpret and determine the “Probability of Attack (PA) from an adversary against critical infrastructure assets and/or key resources” (SMI, 2022, para 3). The CARVER acronym consists of the following criteria: 

Criticality- Identifying key assets and sectors. 

Accessibility- Determining ease of accessing these areas. 

Recoverability- How long will it take to recover from a targeted attack or breach? 

Vulnerability- Security effectiveness compared to the adversary’s capabilities. 

Effect- Magnitude and level of damage that would occur from an attack or security breach.  

Recognizability- Identify the adversary’s ability to identify and recognize targets as areas of critical infrastructure. 

CPTED 

Crime prevention through environmental design (CPTED) is a system that implements environmental conditions to enhance security measures to reduce and prevent criminal activity. CPTED’s goals and objectives focus upon (1) controlling access; (2) providing visual enhancement; (3) defining ownership; and (4) encouraging the maintenance of territory (AMFAM, 2023). CPTED focuses upon crime prevention by utilizing natural elements, instead of ‘hardened targeting’ measures.  

NIPP 

The Department of Homeland Security (DHS) defines the National Infrastructure Protection Plan (NIPP) as a comprehensive risk management framework that clearly defines critical infrastructure protection roles and responsibilities within various federal sectors (DHS, 2023). Further, NIPP utilizes measures to defeat any adversarial threat from any terror attack or minimize damage to critical infrastructure stemming from a natural disaster or another emergency (DHS, 2023).   

CIKR 

Critical Infrastructure and Key Resources (CIKR) describes policies, roles and responsibilities, and the operational plan for “assessing, prioritizing, protecting, and restoring critical infrastructure and key resources of the United States and its territories and possessions during actual or potential domestic incidents” (CISA, 2023, para 1). 

SVA 

The purpose of a Security Vulnerability Analysis (SVA) is to identify gaps in security measures and protocols within an agency, company, etc… After these gaps and deficiencies are identified, then they can be mitigated and/or eliminated. Vulnerabilities must be recognized to identify the most likely target that can be exploited by an adversary. Examples include weak passwords within an IT network, out-of-date computer protection, or inept security personnel. 

IDR 

The Infrastructure Security Division’s Infrastructure Development and Recovery (IDR) program works with all government levels with the goal of enhancing security measures and strengthening the resilience Links to an external site.of critical infrastructure networks against a variety of threats. Further, IDR assists government entities with implementing security measures during all phases of operation, including the design, planning, construction and maintenance. 

THIRA 

According to Bennett (2018), the Threat and Hazard Identification and Risk Assessment Guide (THIRA) is a four-step process that consists of the following: 

  1. Identifying the specified threats and hazards.
  2. Provide context to those threats and hazards. 
  3. Establish capability targets.
  4. Implement the results.

THIRA is very adaptable and can be implemented in jurisdictions of all sizes (Bennett, 2018).  

Christian Worldview 

Proverbs 13:20 (English Standard Version) reminds us to be mindful of protecting each other, stating Whoever walks with the wise becomes wise, but the companion of fools will suffer harm.”  

References 

Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). 

Cybersecurity and Infrastructure Security Agency. (2023, January). Retrieved from https://www.cisa.gov/critical-infrastructure-and-key-resources-support-annex 

Holy Bible (English Standard Version). https://www.openbible.info Links to an external site. 

National Infrastructure Protection Plan. (2023). Department of Homeland Security. Retrieved from https://www.dhs.gov/xlibrary/assets/NIPP_Overview.pdf