• Tidak ada hasil yang ditemukan

Strategies for Protecting National Critical Infrastructure Assets

N/A
N/A
Budi Prakoso

Academic year: 2023

Membagikan "Strategies for Protecting National Critical Infrastructure Assets"

Copied!
646
0
0

Teks penuh

More than half a century later, in the midst of the Second Industrial Revolution, this was a generation focused on building the future. Disclaimer Disclaimer: Although the publisher and author have used their best efforts in the preparation of this book, they make no representations or warranties as to the accuracy or completeness of the contents of this book and expressly disclaim all implied warranties of merchantability or fitness. for a specific purpose. He is recognized as one of the most respected and important security experts in the industry.

CONTENTS

PART 1-UNDERSTANDING THE ENVIRONMENT 1 INTRODUCTION

Exhibits

Documenting the scope strategies implemented, 103 Documenting current or proposed security initiatives, 103 Documenting the status of program guidance, 103. 5.1-Worksheet 1: Contacts, Key Stakeholders, Persons 5.2-Worksheet 2: Characteristics of 102gie5,-3. Worksheet 3: Corporate strategies and scope addressed, 104 5.4-Worksheet 4: Security initiatives, 105. 6.2-Worksheet 7: Define critical operational criteria and business 6.3-Worksheet 8: Facility ranking based on operational criteria, criteria 4-4-criteria, criteria 6 , 122.

Chapter 7 Exhibits

Measuring and recording the status of institutional drivers and measuring and recording the status of current physical security, documenting the results of tests and exercises, 176. Subtask 4C-Status of IT network systems, 178 Subtask 4D-Status of facility security functions, 178 Subtask 4E-Status Electronic security systems, 179 Subtask 4F-Status of Security Operations Methods and Subtask 4G-Status of the Information Security Program, 18 1 Subtask 4H-Status of the Personnel Protection Program and Human Subtask 41-Status of Practical Ability to Detect, Assess, and Respond to Subtask 4J-Status of the Security Organizational Structure and. 8.2-Program exercises and test development model, 172 8.3-Worksheet 19: Status of institutional drivers and performance 8.4-Worksheet 20: Recording current physical security status 8.5-Worksheet 2 1: Recording evaluation of exercises by the organization.

Exhibits

Aligning the S3E Safety Assessment Methodology to the Water Water Challenges Facing the Safety Assessment Team, 230 Applying the S3E Safety Assessment Methodology to the Water.

Exhibits

1 1.21-Improve the previous analysis of the undesirable water enterprise 1 1.22-Improve the previous analysis of the water enterprise of 1 1.23-Analyze the selection of specific actions for risk reduction. 1 1.25-Evaluate the effectiveness of the mitigation solutions developed by the water company and the remaining vulnerability [PE Develops the short-term and long-term water cost estimate. Adapting the S3E Security Assessment Methodology to Power Energy Challenges Facing the Security Assessment Team, 261.

Exhibits

12.16-Evaluate the existing interface and relations of energy companies with partner organizations [PEI Evaluate Existing Energy SCADA and Security System. 12.23-Analyze the Selection of Specific Risk Reduction Actions Against the Current Risk and Develop the Prioritized Plan for Energy Enterprise Mitigation Solutions [PE2], 275. 12.25-Evaluate the Effectiveness of Developed Energy Enterprises Mitigation Mitigation and Mitigation of Enterprises Energy and Long-Term Energy.

Chapter 13 Exhibits

13.13-Evaluate existing transport enterprise security 13.14-assess existing transport enterprise security 13.15-Evaluate existing transport enterprise interface and 13. 13.20-Improve previous transport enterprise analysis An undesirable transport refresh. ation Enterprise. Against the current risk and priority plan development for mitigation solutions of transport enterprises [PE Develop the Transport Enterprise Short and Long Term.

Exhibits

14.14-Evaluate Existing Chemical and Hazardous Materials Company Safety Operations and Protocols [PE Evaluate Existing Chemical and Hazardous Materials in Enterprises-. 14.2 1-Refine previous analysis of adverse impacts developed by companies on chemical and hazardous materials that can affect functions, 398. 14.25-Evaluate the effectiveness of solutions developed by companies for risk mitigation and residual vulnerability to chemical and hazardous materials [PE2], 399.

Appendix

14.23-Analyze the selection of specific actions to reduce the risk against the current risk and develop a prioritized plan for enterprise solutions for mitigation of chemical and hazardous materials [PE2], 398. Enterprise mitigation solutions complement the previous analysis of chemicals and dangerous.

Exhibits

Address the current risk and develop a prioritized plan for agribusiness mitigation solutions LPE21, 440. 15.24-Evaluate the effectiveness of mitigation solutions developed by agribusiness and remaining vulnerabilities 15.25-Develop a short-term and long-term agriculture cost estimate. A Historical Review of Selected Terrorist Attacks, Criminal Incidents and Industrial Accidents, Within the Agriculture and Food Sector, 442.

Exhibits

16.17-Defining a banking and financial firm's adversarial plan, disruption, disruption sequence, and path analysis Evaluate the effectiveness of a banking and financial firm. Against the current risk and develop a priority plan for banking and financial company mitigation solutions [PE2], 470. 16.24-Evaluate the effectiveness of banking and financial company mitigation solutions developed and remaining vulnerabilities 16.25-Develop a cost estimate for short-term and long-term banking.

Exhibits

17.15-Evaluate existing telecommunications enterprise interface and relationship with partner organizations [PEI Evaluate existing telecommunications SCADA and security. 17.17-Define Telecommunications Enterprise Adversary Plan, Distractions, Sequence of Disruptions and Path Analysis Evaluate Telecommunications Enterprise Effectiveness of. 17.20 - Refine previous analysis of telecommunications companies Undesirable consequences that may affect functions Refine previous analysis of telecommunications companies.

Appendix

PREFACE

Part I

UNDERSTANDING THE ENVIRONMENT

INTRODUCTION

  • Part 1. Understanding the Environment
  • Part 11. Understanding Security Assessment
  • The Water Sector Chapter 12. The Energy Sector
  • The Transportation Sector
  • The Chemical Industry and Hazardous Materials Chapter 15. The Agriculture and Food Sector
  • The Banking and Finance Sector Chapter 17. The Telecommunications Sector

The S3E Security Assessment Methodology focuses on clearly identifying, measuring and prioritizing security risks for high-threat environments. In Chapter 2, Environments Affecting Security Assessment: Threats, Western Values, and the National Critical Infrastructure Sectors, American values ​​are contrasted with the ideology of terrorists. The security assessment methodology as a system-level perform- Distinct benefits of S3E Security Assessment Methodology Enterprise key security strategies.

ENVIRONMENTS THAT INFLUENCE THE SECURITY ASSESSMENT

Threats, Western Values, and the National Critical Infrastructure Sectors

The end of the Cold War and the collapse of the Soviet Union dramatically rearranged the scope and complexity of international terrorism. The main thrust of the current terrorist threat in the West comes from an ideological war within Islam. The most difficult terrorist threat to contain comes from citizens of the United States within our borders.

In America in 1763 there were battles between the British and the Indians for lands west of the Appalachians. Osama bin Laden's declared "Holy War" against free countries of the world led to the exposure of a terrorist conspiracy against the US government and US interests worldwide. A1 Qaeda issued statements under the banner of "The World Islamic Front for Jihad Against the Jews and Crusaders" warning that it would attack American and Israeli targets.

They frame our daily lives and enable us to enjoy one of the highest overall standards of living in the world. The citizens of the United States have faced increasing threats of harm since the terrorist attacks of September and the delivery of anthrax-tainted letters later that year. The events of September and the subsequent passage of the Bioterrorism Act of 2002 pushed security to the top of the agenda for many managers.

Gaffney, Jr., director of the Center for Security Policy, quoted in "Terrorists Among the States" by Nathan M.

Part I1

UNDERSTANDING SECURITY ASSESSMENTS

Chapter 3

THE SECURITY ASSESSMENT

WHAT, WHY, AND WHEN

Chapter 4

A PROVEN SECURITY ASSESSMENT METHODOLOGY

S. Means

The second layer, the S3E Security Evaluation Methodology (see Figure 4.2), shows the detailed breakdown of the process by specific task and the associated interfaces of each program element to be explored. The S3E Security Assessment Methodology consists of the following necessary components: strategic planning, program effectiveness, program analysis and reporting, and the implementation plan. The enterprise's internal (or operational) environment is the institutional "driver" of the security assessment process.

A safety risk assessment is a qualitative and/or quantitative determination of the probability of occurrence [PA] of an adverse event. Standards and metrics based on the performance of a company's security program to measure the effectiveness of the overall security program. Standards and metrics based on the performance of a company's security program to measure the effectiveness of the overall security program.

High density boundary and area lighting to aid in monitoring and assessment of the property during periods of reduced visibility. Boundary and area security lighting to assist with monitoring and assessment of the property during periods of reduced visibility. Boundary and area lighting to help monitor the property during periods of reduced visibility.

Boundary and area lighting to assist with property surveillance. Personnel identification techniques for entering and exiting the area.

STRATEGIC PLANNING: UNDERSTANDING

Developing an effective project strategy requires the security consultant and security assessment team to have a comprehensive understanding of the corporate culture and its strategic vision in order to pursue project goals and objectives in a systematic, organized and aggressive manner. Getting the security assessment team to establish communication and rapport with the business early in the project is critical to overall success. Task 1, project strategic planning: understanding service requirements, allows the security consultant and members of the security assessment team to strengthen the level of trust established in the enterprise.

One of the critical elements of this stage emphasizes understanding service requirements and nurturing the business relationship between the enterprise and the security assessment team. They lay the groundwork for bringing all the project stakeholders together, outline roles and responsibilities and lay the groundwork for information sharing. They also let enterprise staff know what to expect during the process so they can better help the security assessment team complete the task at hand.

Subtask 1 A-Project Mobilization and Startup Activity

Subtask 1 &Investigation Preplanning

The agenda is formalized by the security consultant and approved in writing by the company. After the project kick-off meeting, the security assessment team reviews available data and the enterprise culture to base the assessment process on. Business operations, processes, techniques and best practices are reviewed to expose vulnerabilities that affect the security integrity of the enterprise.

Based on the size and complexity of the project, the safety assessment team may also hold multiple concurrent workshops, then regroup to compare and consolidate the team's observations and notes. Internal site interviews help the security assessment team to understand the enterprise culture, to gain insight into the strengths and weaknesses of existing practices, to identify specific security. When the enterprise approves the visit schedule, the safety assessment team can mobilize the site investigations using the appropriate team configuration suitable for the specific task.

Documenting Contacts, Key Stakeholders and Interviewees Worksheet 1 documents all individuals with whom the security assessment team met to discuss project requirements. The management status of the security program can be simply summarized as ADDRESSED, INCOMPLETELY ADDRESSED, or UNADDRESSED. Provides the security assessment team with valuable insight into security program improvement plans.

An effective project strategy enables the security consultant and security assessment team to pursue project objectives in a systematic, organized and positive manner.

Chapter 6

ASSESSMENT

UNDERSTANDING THE SERVICE ENVIRONMENT

AND CHARACTERIZE THREATS

TO THE SERVICE ENVIRONMENT

Chapter 8

PROGRAM EFFECTIVENESS

Program effectiveness is the measure of the company's ability to carry out its security mission. Under this task, existing policies, processes, protocols, and protective measures are analyzed to determine the current effectiveness of the security organization and its dependent partners in preventing terrorist attacks or adverse events and their consequences. It identifies the overall strengths and weaknesses of the enterprise as well as the specifics of the security organization, as well as the barriers to performance.

What are the objectives and strategies of the overall security program and the mission of the security systems in place and other protective measures. How well the enterprise's institutional “leaders” and performance strategies contribute to the effectiveness of the overall security program. Contracting guard forces lack tactical response and search-and-rescue expertise and adequate training to meet security mission requirements.

In other cases, third-party alarm monitoring agencies were responding to an alarm without notifying the enterprise security organization of their actions or the severity of the alarm incident. An example of this point was a recent security breach at a Fortune 500 company that involved the dispatch of local law enforcement agencies and the FBI to the scene, as well as other special first responders and some of the company's top managers. corporation. The company's security organization was not made aware of the incident until Tuesday morning.

In this scenario, the security organization was unaware of the status of a critical object it was responsible for protecting.

Referensi

Dokumen terkait