99 Hlsc 720-discussion 3-reply 2 | HLSC 720 – Critical Infrastructure: Vulnerability Analysis and Protection | Liberty University

The thread must be a minimum of 200-400 words. MINIMUM OF TWO SOURCES BESIDES THE TEXTBOOK. Must cite at least 2 sources in addition to the Bible.
TEXTBOOK: Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. ISBN: 9781119237785.
**JOHNATHAN**
#button {
background-color: #F05A1A;
border: 5px;
border-radius: 5px;
color: white;
padding: 5px 5px;
text-align: center;
text-decoration: none;
display: inline-block;
font-size: 13px;
margin: 4px 2px;
cursor: pointer;
}

Save your time – order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

CARVER 
CARVER is a target Analysis and vulnerability assessment system which utilizes both qualitative and quantitative procedures to identify, interpret and determine the “Probability of Attack (PA) from an adversary against critical infrastructure assets and/or key resources” (SMI, 2022, para 3). The CARVER acronym consists of the following criteria: 
Criticality- Identifying key assets and sectors. 
Accessibility- Determining ease of accessing these areas. 
Recoverability- How long will it take to recover from a targeted attack or breach? 
Vulnerability- Security effectiveness compared to the adversary’s capabilities. 
Effect- Magnitude and level of damage that would occur from an attack or security breach.  
Recognizability- Identify the adversary’s ability to identify and recognize targets as areas of critical infrastructure. 
CPTED 
Crime prevention through environmental design (CPTED) is a system that implements environmental conditions to enhance security measures to reduce and prevent criminal activity. CPTED’s goals and objectives focus upon (1) controlling access; (2) providing visual enhancement; (3) defining ownership; and (4) encouraging the maintenance of territory (AMFAM, 2023). CPTED focuses upon crime prevention by utilizing natural elements, instead of ‘hardened targeting’ measures.  
NIPP 
The Department of Homeland Security (DHS) defines the National Infrastructure Protection Plan (NIPP) as a comprehensive risk management framework that clearly defines critical infrastructure protection roles and responsibilities within various federal sectors (DHS, 2023). Further, NIPP utilizes measures to defeat any adversarial threat from any terror attack or minimize damage to critical infrastructure stemming from a natural disaster or another emergency (DHS, 2023).   
CIKR 
Critical Infrastructure and Key Resources (CIKR) describes policies, roles and responsibilities, and the operational plan for “assessing, prioritizing, protecting, and restoring critical infrastructure and key resources of the United States and its territories and possessions during actual or potential domestic incidents” (CISA, 2023, para 1). 
SVA 
The purpose of a Security Vulnerability Analysis (SVA) is to identify gaps in security measures and protocols within an agency, company, etc… After these gaps and deficiencies are identified, then they can be mitigated and/or eliminated. Vulnerabilities must be recognized to identify the most likely target that can be exploited by an adversary. Examples include weak passwords within an IT network, out-of-date computer protection, or inept security personnel. 
IDR 
The Infrastructure Security Division’s Infrastructure Development and Recovery (IDR) program works with all government levels with the goal of enhancing security measures and strengthening the resilience Links to an external site.of critical infrastructure networks against a variety of threats. Further, IDR assists government entities with implementing security measures during all phases of operation, including the design, planning, construction and maintenance. 
THIRA 
According to Bennett (2018), the Threat and Hazard Identification and Risk Assessment Guide (THIRA) is a four-step process that consists of the following: 

Identifying the specified threats and hazards.
Provide context to those threats and hazards. 
Establish capability targets.
Implement the results.

THIRA is very adaptable and can be implemented in jurisdictions of all sizes (Bennett, 2018).  
Christian Worldview 
Proverbs 13:20 (English Standard Version) reminds us to be mindful of protecting each other, stating Whoever walks with the wise becomes wise, but the companion of fools will suffer harm.”  
References 
Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: Protecting critical infrastructure and personnel (2nd ed.). 
Cybersecurity and Infrastructure Security Agency. (2023, January). Retrieved from https://www.cisa.gov/critical-infrastructure-and-key-resources-support-annex 
Holy Bible (English Standard Version). https://www.openbible.info Links to an external site. 
National Infrastructure Protection Plan. (2023). Department of Homeland Security. Retrieved from https://www.dhs.gov/xlibrary/assets/NIPP_Overview.pdf