Critical Infrastructure Security

  • Uncategorized

CriticalInfrastructure Security

CriticalInfrastructure Security

Thecritical infrastructure is tasked with providing the necessaryservices that reinforce the American Society, serving as thecornerstone of the country’s health, security, and economy. Assuch, the Department of Homeland Security’s duty is improvingsafety and resilience of the nation’s critical infrastructure.According to the Presidential Policy Directive 21 (PPD-21), securityis the act of minimizing risks within the critical infrastructurethrough cyber defense techniques, intrusions, or impacts ofhuman-made or natural disasters. The security measures includelocking of computers, utilizing antivirus software, and badge entriesamong others. PPD-21 also describes resilience as the capability toprepare and adapt to the diverse situations. It also involves,withstanding and recovering from accidents, deliberate attacks, ornatural occurrences. This paper will show how the departmentevaluates terrorism, criminal, or gang attacks [ CITATION Hom l 1033 ].

Currently,cyber-attacks through gangs are prevalent. The gangs targetmetropolitan traffic control systems, factories, water treatmentsystems, and power generation facilities. Apart from cybercrimes, theteams of gunmen normally injure many people while killing others. Forinstance, when two gangs fight against one another, it may escalateto involve the surrounding community. As such, even the innocentcitizens are injured and killed in the fights. The gangs also operatedifferently with varying targets. While some target control of drugs,others strive to control the different amenities. The PPD-21 strivesto empower the security system to counter the detrimental impacts ofthe gangs. As evidenced in the video, the gangs can also strikepopulated areas causing major havoc [ CITATION Hom l 1033 ].

Criminalattacks mainly target financial institutions. They may operate inteams of two with the intention of harming individuals to get whatthey want. The criminal attacks are also devastating since they canincapacitate normal proceedings. Terrorist attacks are mainly carriedout by extremists. Terror groups are primarily composed of peoplewith similar perceptions e.g. religion trying to make their causeknown. In many instances, the groups are derived from commonbackgrounds. However, current groups recruit people from varyingbackgrounds. Terrorist attacks are the most devastating since theycan kill masses of people. For example, 15 gunmen in a small townkilled close to 240 people. Depending on the severity of the attack,the extremists can injure and kill hundreds to thousands ofindividuals [ CITATION Hom l 1033 ].

Criticalinfrastructure security plays a significant role in curbing thesecrimes. From the 15 terrorists that attacked the small town, six werekilled and another two arrested. This act of withstanding andfighting the terrorists or gangs is entailed in PDD-21. Developingresilience implores the department to heighten the social mediainfrastructures. In recent years, the perpetrators have been usingsocial media to attack innocent citizens. Twitter and Facebook arethe commonest platforms utilized by the criminals. The CIS thusstrengthens on this part to track down the criminals. Social media isalso used to track down extremists. For example, since someterrorists recruit through social media, the CIS team can enhancesecurity by monitoring this avenue. To effectively enforce security,several steps must be undertaken. The steps may vary depending on theinstitution. As such, organizations must access their vulnerabilitiesto both cyber and physical attacks, plan to eradicate the significantweaknesses, create structures that outline and prevent the attemptedattacks, and alert, withstand, and rebuff the attacks. Sixteencritical infrastructure sectors are available and comprise ofsystems, networks, and assets. Through these structures, gang,terrorism, and criminal attacks are countered to maintain peacewithin the community [ CITATION Hom l 1033 ].


Homeland Security. (2016). Critical Infrastructure Security. Retrieved from

Close Menu