Threat Analysis

Threat Analysis

Part 1

The Communications sector is among the 16 sectors designated by as critical infrastructure by the DHS. As such a critical analysis on its nodes, assets and links must be carried out to assess threats, links, and vulnerabilities that may impact its functionality, and allow policymakers institute actions that will increase protection around such items, or increase resiliency in case any unit is breached or an attack occurs. This paper analyses the threats, risks and vulnerabilities and their impacts on the nodes, links, and assets in the Communication sector.

Wireless Node

The Wireless node faces a variety of threats that may interfere with its operability if protection and resiliency measures are not instituted. Firstly, this node is highly susceptible to cybercrime given that the communications sector utilizes infrastructure set up by the information technology to carry out its functions. Denials of service attacks and hacking may fail the node (Roopak, Bhardwaj, Soni, & Batra, 2014).

Satellite Node

The satellite note is responsible for redirecting signals from the senders to the recipients. This node is critical since it works as a link between two nodes, and is equally a link between assets. This assets, just like the wireless node, is susceptible to hacks, especially where adversaries may decide to extract useful information against the United States or where an individual may wish to redirect an American satellite, cutting it off the American communication system. On the other hand, a satellite may be attacked by terrorist missiles, which would render its functionless (Homeland Security, 2015).

Broadcast Node

Thirdly, the broadcast node is responsible for audio, video and data programming that offers communication through various channels. In hindsight, it is probably the most critical node of the communications sector given that most nodes obtain communication commands from it. For instance, the broadcast must occur for the satellite node to be of use, or for the cable and wireline nodes to carry the communications to the respective recipients. It is also the mode that has been used to broadcast emergencies in the U.S As such this node is subject to a variety of threats risks and vulnerabilities (Roopak, Bhardwaj, Soni, & Batra, 2014). For instance, the stations could be attacked by terrorists whereas communication masts are vulnerable to adverse weather and geological occurrences such as earthquakes.

Wireline Node

Fourthly, the wireline node is responsible for the transportation of communication via overhead or underground copper cables. This node contains several assets and links through which its functionality is achieved, upon which numerous threats are possible. Firstly, the base stations are vulnerable to intrusion attacks, both on the physical level or the cyber level. The cyber threats are present due to the use of computers and other infrastructure from the IT sector. On the other hand, the most important assets that make the node functional is the poles and wirelines which in most cases are exposed to adverse weather conditions, which may uproot sections cutting off an area from the entire system. At the same time, these assets are subject to vandalism by human beings and environmental hazards such as fires and falling trees all which affect their operability.

Cable Node

Finally, the cable node combines fiber and coaxial cables to offer multidirectional signal paths to the customer. As opposed to the wireline, this node is mostly in the ground which equally implies it may suffer numerous threats. Firstly, the base stations are subject to attacks both physical and cyber, while the cable lines are subject to forces of nature such as earthquakes and mudslides all of which may uproot and break such cable, resulting in lost connections. On the other hand, human beings may decide to vandalize these products for profit, which in effect severs the communications connections.

Part 2

Budgeting for Protection and Resiliency within the Communications Network

The entire budget would be around 2.1 billion dollars a year, given the vast nature of the communications sector and how the sector works across numerous states. This funding is to be divided into the National Alert Warning System at 500 million U.S dollars, Satellite protection for 500 million dollars and base station protection would be capped at 450, which would sum up the most critical assets of the communications sector. Additionally, training and development of relevant personnel would be capped at 350 million, whereas primary broadcasting would obtain 300 million dollars.

A national emergency alarm system is essential since it helps lower the effects of an incoming threat. This asset, with that, utilizes almost all nodes of the communication sector keeps people safe by warning them of impending danger, allowing them to protect themselves in advance. On the other hand, the emergency alert system advises stakeholders such as the police, and the ambulatory system of a possible breach, which helps save lives.

On the other hand, drilling and training personnel before an emergency is essential as it eliminates the confusion associated with threats, and increasing the efficiency of the response. The funding under this category is, therefore, necessary for the institution of new practice areas and the entire training process. Finally, the satellite plays a vital role in the communication sector; hence its security must be continuously developed and updated to eliminate the chance of such a structure ever falling into the adversaries’ hand.

 

Rationale

Protection works to prevent the possibility of threats ever occurring hence the funding for base stations, and satellites is relevant that it will be used to enhance protective measures such as establishing firewalls and antiviruses, while at the same time support any security infrastructure, such as the use of security cards and building fences around such establishments. On the other hand, Resilience reduces the impact should a threat occur. This makes budgeting for the emergency system and training response teams a top priority (Homeland Security, 2015; Roopak, Bhardwaj, Soni, & Batra, 2014).

 

References

Homeland Security. (2015). Communications Sector-Specific Plan An Annex to the NIPP 2013. Washington D.C: Homeland Security.

Roopak, M., Bhardwaj, T., Soni, S., & Batra, G. (2014). Review of Threats in Wireless Sensor Networks. International Journal of Computer Science and Information Technologies, 5(1), 25-31.

Setola, R., Luiijf, E., & Theocharidou, M. (2016). Critical Infrastructures, Protection and Resilience. In R. Setola, V. Rosato, E. Kyriakides, & E. Rome, Managing the Complexity of Critical Infrastructures (pp. 1-18). New York: Springer.

 
Do you need high quality Custom Essay Writing Services?

Custom Essay writing Service