{"id":48202,"date":"2022-10-27T09:36:29","date_gmt":"2022-10-27T09:36:29","guid":{"rendered":"https:\/\/www.essaybishops.co.uk\/national-infrastructure-protection-plan-nipp\/"},"modified":"2022-10-27T09:36:29","modified_gmt":"2022-10-27T09:36:29","slug":"national-infrastructure-protection-plan-nipp","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/national-infrastructure-protection-plan-nipp\/","title":{"rendered":"National Infrastructure Protection Plan (NIPP)"},"content":{"rendered":"<p>Criminal Justice<br \/>\nTitle: \tNational Infrastructure Protection Plan (NIPP)<br \/>\nNumber of sources: \t0<br \/>\nPaper instructions:<br \/>\nThe foundation of protecting our nation\u2019s critical infrastructures and key resources is the risk management framework. Risk is the possibility of an unwanted event \u2013 the chance of losing something. The goal of risk management is to mitigate loss from a natural or human-made disaster.<\/p>\n<p>For this assignment, read Chapter 3, &#8220;The Strategy: Managing Risk,&#8221; from NIPP 2013: Partnering for Critical Infrastructure Security and Resilience [PDF].<\/p>\n<p>Instructions<br \/>\nWrite a 2\u20134 page paper in which you:<\/p>\n<p>Analyze the National Infrastructure Protection Plan and Risk Management Framework, including Figure 3 \u2013 Critical Infrastructure Risk Management Framework on page 15 of the National Infrastructure Protection Plan, and conclude how it has been designed to protect the nation&#8217;s critical infrastructure.<br \/>\nDetermine the purpose of the feedback loop design and argue how it strengthens or weakens the model. Justify your response.<br \/>\nDecide if taking a &#8220;risk management&#8221; approach is suitable for protecting the nation&#8217;s critical infrastructure. Support your response.<br \/>\nChoose the one step that is the most important or has the greatest impact on the other steps of the Risk Management Framework and describe why.<br \/>\nDiscuss your thoughts on the effectiveness of the NIPP, and suggest one change you would make to the plan. Support your response.<br \/>\nUse the Strayer Online Library, the Internet, or your supplemental resource list to locate at least three quality resources for use in this assignment.<br \/>\nThis course requires the use of Strayer Writing Standards. Please refer to the Strayer Writing Standards link in the left-hand menu of your course for assistance and information. Check with your professor for any additional instructions.<\/p>\n<p>The specific course learning outcome associated with this assignment is:<\/p>\n<p>Examine the strengths and weaknesses of the National Infrastructure Protection Plan and Risk Management Framework.<\/p>\n<p>&#8212;<\/p>\n<p>National Infrastructure Protection Plan (NIPP)<\/p>\n<p>National Infrastructure Protection Plan (NIPP) is an approach that the federal government is using in establishing national goals, essentials, and priorities, Establishing the national goals, essentials and priorities is important when it comes to critical infrastructure and resources protection (Homeland). It is through the protection of these infrastructure and key resources that the federal government can distribute the funding and other national resources effectively. Also, the federal government can be able to detect threats, reduces chances of vulnerability, and also minimize the attacks that may happen to these infrastructures and resources.<br \/>\nThe National Infrastructure Protection Plan specifies the key initiatives steps and achievements of the National government in protecting infrastructure and the key resources. The plan has established varying concepts that are relevant to the Homeland Security Department in addressing cyber, physical, and human security (Lewis, 2019). The plan has also stated the roles of other federal government institutions such as the Federal Sector-Specific Agencies at the federal level and the state levels.<br \/>\nFigure 3 of the National Infrastructure Protection Plan comprises the Critical Infrastructure Risk Management Framework. The Critical Infrastructure Risk Management Framework enables the federal government in integrating strategies, abilities, and governance in risk-informed decision-making processes (Lopez, Liefer, Busho &amp; Temple, 2017). This Critical Infrastructure Risk Management can apply to all forms of threats; cyber-crimes, terrorism, and natural disasters. The Critical Infrastructure Risk Management also works together with the Threat and Hazard Identification and Risk Assessment. Threat and Hazard Identification has the role of identifying how potential threats may affect the communities and how to mitigate such threats.<br \/>\nFeedback loop design is a key element in the National Infrastructure Protection Plan which is responsible for maintaining a continuous planning strategy. The Feedback loop design has enabled the federal government to evaluate the National Infrastructure Protection Plan (Lopez, Liefer, Busho &amp; Temple, 2017). This evaluation has been possible through measuring all sectors in the plan and the protection strategies related to threats and risks. From my point of view, the Feedback loop design strengthens the National Infrastructure Protection Plan. The reason is that the Feedback loop design entails gathering information concerning the effectiveness of the plan and from this information, the federal government can decide on the adjustment that it needs to take in improving all sectors.<br \/>\nTaking risk management is suitable when it comes to protecting the nation&#8217;s critical infrastructure. The reason why risk management is a suitable approach is that it empowers the federal government to have the necessary tools that it can use to address a possible risk (Lewis, 2019). Another importance of the risk management approach is that it helps the federal government in minimizing the negative consequences as a result of any risk. Another advantage of risk management is that it enables the national government to define and set essential plans.<br \/>\nOne of the most important steps in the Risk Management Framework that is beneficial to all other steps is the measure effectiveness approach. The measure effectiveness approach entails the use of evaluation procedures the most essential procedure in this approach is the use of metrics. The reason why I consider the measure effectiveness approach to be significant to other steps is that gives a detailed account of progress in the entire framework, thus enabling the federal government to adjust to improve the framework&#8217;s efficiency.<br \/>\nFrom my thoughts, the National Infrastructure Protection Plan is an effective plan that can guarantee sustainable security of infrastructure and key resources. The reason why I consider the plan to be effective is because of its continuous effective framework in protecting the critical infrastructure and key resources. One of the changes that I think the federal government can apply to raise the plan&#8217;s effectiveness is engaging more research from well-informed personnel.<br \/>\nOne of the strengths of the National Infrastructure Protection Plan is that it entails a framework involving several government institutions that work together in achieving its efficiency. Another strength of the plan is that it has a continuous evaluation that is responsible that helps to determine shortcomings in the plan. On the other hand, one of the weaknesses of the National Infrastructure Protection Plan is computer insecurity due to poor control.<\/p>\n<p>References<br \/>\nHomeland Security. National Infrastructure Protection Plan. Gov Library Assets. https:\/\/www.dhs.gov\/xlibrary\/assets\/NIPP_RiskMgmt.pdf<br \/>\nLewis, T. G. (2019). Critical infrastructure protection in homeland security: defending a networked nation. John Wiley &amp; Sons.<br \/>\nLopez, J., Liefer, N. C., Busho, C. R., &amp; Temple, M. A. (2017). Enhancing critical infrastructure and key resources (CIKR) level-0 physical process security using field device distinct native attribute features. IEEE Transactions on Information Forensics and Security, 13(5), 1215-1229.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminal Justice Title: National Infrastructure Protection Plan (NIPP) Number of sources: 0 Paper instructions: The foundation of protecting our nation\u2019s critical infrastructures and key resources is the risk management framework.\u2026<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6926,6925,6924,1387,6928,667,6923,6922,6927,6610],"tags":[6940,1400,613,142,6934,1394,6938,6935,6933,6937,6939,6941,222,6930,6936,133,6929,6886,6931,6932],"class_list":["post-48202","post","type-post","status-publish","format-standard","hentry","category-assignment-help","category-assignment-writing-help","category-dissertation-help","category-dissertation-writing-service","category-healthcare-assignment-help","category-nursing-essay","category-research-essay-help","category-research-paper-writing-service","category-write-my-essay-for-me","category-write-my-essay-online","tag-affordable-dissertation-writing-service","tag-best-custom-essay-writing-services","tag-best-dissertation-writing-services-uk","tag-best-online-essay-writing-services","tag-cheap-custom-essay-writing-services","tag-custom-research-paper-writers","tag-custom-research-papers-writing-service","tag-essay-writer-websites","tag-essay-writing-service-quality-cheap","tag-free-research-paper-writing-service","tag-help-me-write-a-research-paper","tag-i-need-help-with-my-dissertation","tag-online-research-paper-writing-service","tag-professional-dissertation-writing-service","tag-quick-essay-writing-service","tag-research-paper-writing-service-cheap","tag-service-writing-my-essay-write-custom","tag-someone-to-write-my-paper","tag-top-rated-dissertation-writing-services","tag-top-uk-dissertation-writing-services"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/48202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=48202"}],"version-history":[{"count":0,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/48202\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=48202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=48202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=48202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}