Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Student’s name:
Professor:
Course name:
Date:
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 2
Critical infrastructural sectors of the United States have been exposed to 21st Century
complex issues that are beyond their scope. Notably, the complexity of these issues results from
the 21st Century factors such as population increase, globalization, and technological
development. The United States' critical infrastructural sectors, therefore, are now designed to
allow their interdependence with the objective of dealing with common complex issues. Energy
Sector, Nuclear Sector, and Information Technology Sector are among the other 16 important
United States infrastructural sectors that have collaborated to address the complex issue of
security (Lewis, 2019). The systems of Energy, Nuclear, and Information Technology sectors are
The United States Nuclear Sector comprises three key subsectors, including Nuclear Waste,
Nuclear Materials, and Nuclear Facilities. The Nuclear Sector overlaps with the Energy Sector at
the asset and operation level because of their shared objective of electricity production. The
overlap mentioned above is based on the fact that the Energy Sector is assigned a primary role in
managing power transmission and distribution in the United States. Although the Nuclear
Regulatory Commission regulated the operation of the Nuclear Sector, it has to collaborate with
the Energy Sector to ensure that the generated electricity reaches safely reaches the consumers.
Notably, Nuclear Plants across the United States have transformers that enable them to step up
electricity voltage to facilitate its transmission through the national grid. The Nuclear Sector
also depends on the Energy sector for emergency power supply during maintenance operations
and emergencies such as reactor meltdown. Reactor meltdown occurs due to the natural
calamities such as tsunamis and earthquakes or technical problems within the nuclear plant.
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 3
Studies show that power supply interruption on the national electricity grid would have direct
It is important to note that the United States Energy Sector controls important energy
resources, including natural gas, petroleum, and electric power. However, the United States
Energy Sector depends on Nuclear Sector to meet the electrical power demand in the market.
The Nuclear Sector generates approximately 19.7 percent of the total electricity consumed in the
United States. The Nuclear Sector, therefore, teams up with the Energy Sector in protecting the
national electricity power resource by hiring services of the United States Information
Technology Sector.
The Energy and Nuclear Sectors involve the Information Technology Sector in the
Additionally, these sectors include the IT Sector in protecting their systems from cybercrime
activities. Cybercrime is a global problem that has affected energy and nuclear sectors across the
globe. In 2015, for example, hackers illegally accessed the power grid of Ukraine and managed
to disconnect 43 substations from the national grid. The United States government energy and
nuclear sectors currently face cyber-attack threats from ISIS terrorist group and Dragonfly 2.0
campaign. The Homeland Security Department describes Dragonfly 2.0 as a Russian terrorist
group that aims at disrupting the normal operation of the critical infrastructure of the United
States. The Information Technology Sector, therefore, has created a cyber networking platform
that allows the dissemination and sharing of threat and security data between the Nuclear Sector,
Energy Sector, and the Homeland Security Department (Khattak et al., 2017). Sharing of threat
and security data enables these critical sectors to collaborate with the Homeland Security
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 4
Department in the development of platforms for disaster recovery, response, prevention, and
preparedness.
The United States government considers the assets of the Energy Sector, Nuclear Sector, and
Information Technology Sector vital to public health, economic security, and homeland security.
The Nuclear Sector assets targeted for protection from humanmade and natural disasters include
the reactors, the radioactive materials, and radioactive waste. Reactors in the nuclear plants
generate electricity and add it to the national grid. The main types of reactors used in power
generation include Boiling Water Reactors (BWR), Pressurized Heavy Water Reactors, and
Pressurized Water Reactors (PWRs). The United States government has revised its nuclear
power program to avoid the problems experienced in the previous nuclear power plant disasters,
including Chernobyl and Fukushima Daichi disasters that posed a huge threat to human life and
ecosystem. The government observes that terrorist groups can bomb or hack into the IT facilities
The United States Government also protects the radioactive materials used in the cores of
reactors such as Uranium-235 to prevent their leakage or access by unauthorized individuals. The
government considers that terrorist groups can use radioactive materials to manufacture weapons
of mass destruction. Additionally, nuclear wastes can also be transformed into weapons of mass
destruction; hence their disposal points should be placed under tight security. The Energy Sector
collaborates with crucial other government sectors in the United States to ensure safe storage,
transport, and disposal of waste products from nuclear facilities. The Nuclear Regulation
Commission develops policies and regulations to protect assets in the Nuclear Sector in
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 5
collaboration with the Homeland Security Department and other sectors, including the IT and
The assets in the Energy Sector are linked to its natural gas, petroleum, and electrical power
resources. These assets are owned by local, federal, state, and private entities in the United
States. Assets in the Energy Sector include power generation plants, transmission and
distribution facilities, electricity markets, and control systems. Additionally, the power
transmission and distribution assets in this sector include control centers, substations, main
stations, and power lines. Energy involves other sectors in the electricity generation such as
nuclear, hydroelectric dams and renewable energy sectors. The petroleum and gas facilities
include the offshore and onshore extraction platforms, storage and refineries, pipelines, control
systems, and markets. Protection of the assets in the Energy Sector is essential since their
physical damage and hacking of their IT platforms can disrupt normal operation in residential
The Information Technology (IT) Sector of the United States comprises a complex array of
infrastructure. The assets in the IT sector include computerized organizational systems, personal
computers, internet, and cloud computing platforms. The IT sector shares its cloud computing
assets with other critical sectors in the United States and the Homeland Security Department with
an objective of disseminating and sharing security data. The IT sector in the United States uses
innovation, creativity, and teamwork to protect digital systems, networks, and computer systems
The United States Information Technology Sector classifies cyber threats on its assets into
intentional and unintentional ones. The unintentional threats, in this case, includes mistakes
made by employees because of inexperience and low level of skills, errors in computer coding
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 6
processes, and equipment failures. Unintentional threats on the assets in the United States IT
Sector also includes critical failures in the infrastructures of collaborative sectors and physical
damage by natural disasters such as typhoon, floods, wildfires, and tsunami. The intentional
threats on the assets of IT Sectors, on the other hand, includes sabotage by disgruntled workers,
physical damage by terrorists, hacking and virus infiltration, and information warfare.
Information warfare in the 21st Century is evidenced by the case of WikiLeaks that has been
government. WikiLeaks activities are among other information warfare activities that are
The information technology, energy, and nuclear sectors in the United States have developed
defensive mechanisms to prevent and overcome 21st Century threats on their assets. The Nuclear
Sector, for example, has established the Nuclear Sector Coordinating Council (NSCC) to protect
its assets. The NSCC was formed to promote emergency, cybersecurity, and physical
preparedness in accordance with the expectation with the overall goal of protecting the national
infrastructure. NSCC collaborates with Homeland Security Department and the IT sector in
protecting reactors for electricity power generation and other used for non-power generation
activities such as training, testing, and research. The defense strategy also aims at protecting
radioactive materials and radioactive waste during storage, transportation, and disposal (Moore
The Nuclear Sector of the United States also formed a Nuclear Cyber Sub-council in
collaboration with Nuclear Government Coordinating Council in 2007. The primary role of the
Nuclear Cyber Sub-council to safeguard the Nuclear sector from cybercrimes. The Nuclear
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 7
Cyber Sub-council is operated in joint consultation with the representatives from private sectors,
the Nuclear Regulatory Commission, Federal Bureau of Investigation and Homeland Security
Department. The sub-council is operated based on the Homeland Security Department’s slogan
individuals, governments at the local, federal and state levels, and private companies.
The United States Energy sector collaborates with the Homeland Security department in the
protection of its assets. Notably, this collaborative process mentioned above aims at ensuring the
continuity of operation of the Energy sector after humanmade and natural disasters. The
emergency preparedness strategies in the Energy Sector of the United States involves the
identification of vulnerabilities of its assets. First, the location and physical attributes of the
assets are identified to enable the Energy sector to develop protective, vulnerability, and risk
management strategies. Second, the cyber characteristics of the Energy Sector are identified to
facilitate control and monitoring of is systems. Third, information regarding the volumetric
characteristic of the Energy Sector facilitates the adoption of damage assessment procedures to
facilitate reinstatement of its operation. Fourth, the human resource characteristic of the Energy
Sector is also involved in the formulation of the risk management plan (Poustourli & Kourti,
2014). Notably, highly skilled and experienced personal in the Energy Sector would ensure the
effectiveness of the risk management procedure. A high level of skills and experience among the
employees would enable the sector to maintain reliability, security, and safety in case of
emergencies.
The IT Sector of the United States also collaborates with the Homeland Security Department
in protecting its assets and those of its clients. As mentioned above, the IT sector in the United
States offers cloud computing services to other sectors in the United States. The risk
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 8
computer security, and personnel security. These disciplines have a complementary relationship
with regard to the ensuring security of organizational systems. Studies have shown that failure in
any cybersecurity discipline increases the vulnerability of the other disciplines. The designers on
IT infrastructural systems hence ensure that the cybersecurity disciplines effectively protect the
system from all types of cybercrimes. The design of defense components of the IT infrastructural
system should incorporate technological innovation and creativity. IT experts working in the
United States Energy Sector are expected to stay up to date with the latest technologies to
protecting life and property during emergencies. Studies have shown that terrorist attacks on the
nuclear, information technology and energy sectors would lead to death and incapacitation of
many people, and destruction properties of immense value. Experts base their arguments on the
results from previous catastrophes from different parts of the world. The Chernobyl disaster of
1986, for example, led to the death of approximately 54 people and the abandonment of
properties occupying an area of over 1544 square miles. The hacking of the Ukrainian national
power grid in 2015 in a cyberwar between the Ukrainian and Russian governments is said to
Terrorist threats on the energy, IT, and nuclear sectors of the United States has significantly
affected the normal operation of the businesses and government. The case of WikiLeaks and
threats posed by the Dragonfly 2.0 group has led to the diminished trust of the United States on
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 9
the Homeland Security Department. These threats have also discouraged private investments in
The United States government's move to protect the assets in the Nuclear Sector is based on
the hazardous effects of the materials involved. The United States government avoids a scenario
where the radioactive materials are used in the manufacture of weapons of mass destruction. The
historical contexts of nuclear weapons show that the use of these weapons leads to devastating
economic, physical, and psychological consequences. Notably, most reactors in the United States
and other nations across the globe generate nuclear power through the fission process of
Uranium-235 is commonly used in the making of atomic bombs. The Japanese city of Nagasaki,
for example, was bombed using a Uranium-235 bomb that weighed over 9000 pounds. This
bomb immediately killed about 80,000 people, where approximately 200,0000 deaths related to
the irradiation exposure occurred over the subsequent decades in Hiroshima (Maguire, 2018).
The technological advancement and huge population in the United States cities means that the
casualties would be higher of an atomic-based terrorist attack is conducted in the 21st Century.
The Defense Department of the United should intensify the security of the nuclear plant and
nuclear waste disposal areas to prevent radioactive materials from getting into the wrong hands.
Protecting nuclear, energy, and information technology assets would make the United States
resilient and more secure from terrorist attacks. The protection procedures involve the mitigation
of all risks to the systems, assets, and networks of these sectors. The main objective is to protect
individuals from incapacitation, injury, deaths, and psychological problems caused by the
terrorist attacks on these sectors. The protection procedure also includes activities such as
vulnerability mitigation, threats deterrence, and minimization of the severity of the incidences.
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 10
The United States government should also integrate effective technologies of protecting the
through vulnerability assessments. The vulnerability assessments conducted should test their
abilities to overcome threats from computer systems and physical forces such as aerial and
ground-based attacks. The defense systems of these sectors should feature periodic technological
training to ensure that the defense systems stay abreast of modern war technologies.
HLSS 310 CRITICAL INFRASTRUCTURE PROTECTION 11
References
Economica, 17(4).
Khattak, M. A., Shaharuddin, M. K. H., Islam, M. S., & Ahmad, M. H. N. (2017). Review of
Maguire, A. (2018). World politics explainer: The atomic bombings of Hiroshima and Nagasaki.
The Conversation.
Moore, T., & Shenoi, S. (Eds.). (2010). Critical Infrastructure Protection IV: Fourth Annual
2010, Washington, DC, USA, March 15-17, 2010, Revised Selected Papers (Vol. 342).
Poustourli, A., & Kourti, N. (2014). Standards for Critical Infrastructure Protection (CIP)-The
Stergiopoulos, G., Vasilellis, E., Lykou, G., Kotzanikolaou, P., & Gritzalis, D. (2016, March).
the 10th International Conference on Critical Infrastructure Protection, USA (Vol. 8).