Vulnerability Analysis and Risk Assessment of the CI – Transportation Network
I. Introduction to Fundamental Concepts of CI
The transportation network is an essential infrastructure in the US. Critical infrastructure refers to the wide network of assets, such as tunnels, bridges, railways, highways, and buildings, which are necessary for the maintenance of normal life activities. Protecting critical infrastructure is important in safeguarding the infrastructure, ensuring the safety of users, and maintaining a connection among the different critical infrastructures (DHS, 2021). Each critical infrastructure encounters threats and vulnerabilities that undermine the safety of users and infrastructure. In this case, the transportation network is exposed to terror threats, natural calamities, and accidents that result from human error. Various measures, such as installation of surveillance gadgets, training of employees, sharing intelligence between the key stakeholders and law enforcement to ensure compliance with current regulations, and creation of emergency responses, as well as alternative routes of transport, should be implemented to mitigate these threats. These are used to ensure the resilience, safety, and reliability of the assets within various networks in the transportation sector.
Preliminary Assessment of Primary Threats, Vulnerabilities, Risks and Strategy
The transportation infrastructure is plagued by terrorist attacks as one of the main threats. For instance, 60 percent of attacks in Tennessee were bombings and targeted the transportation sector. The threat continues to grow, especially since the 9/11 attack (National Academy of Sciences, 2021). Secondly, environmental aspects such as extreme weather conditions present a significant risk to the transportation system. Tornadoes, hurricanes, thunderstorms, and floods interrupt the safety, resilience, and connectivity of all assets. Thirdly, human errors are also primarily one of the main threats that increase the vulnerability of transport networks. Human errors manifest as accidents, technical errors, and delays. All these undermine the reliability and resilience of the networks. Finally, cybercrimes also present a significant risk to the transport network because they can disrupt communication processes. The resilience of the transport network is highly dependent on the protection measures that are instituted (Evey, 2001). These measures include the installation of surveillance gadgets, training of employees, sharing intelligence between the key stakeholders, law enforcement to ensure compliance with current regulations, screening of passengers, and creating emergency responses/plans as well as alternative routes of transport (Moteff, 2005).
Understanding Vulnerabilities Using Lower Colorado River Dam
Risk Assessment Methodology-Dams (RAM-D) is a process that is useful in assessing risk. The tool analyses the security risk of dams and enables users to create a practical and systematic strategy for mitigation of the identified risks. Sandia National Laboratories for the Interagency Forum for Infrastructure Protection (IFIP) prepared RAM-Din 2001 (Harrald, 2004). The main assumption that guides the tool is;
Risk = (Likelihood of attack) * (Consequence) * (1-System Effectiveness)
Using this tool allows users to understand the consequences of an attack, threats definition, and the available resources such as terrorists, quantifies risk, classification of the facility’s vulnerabilities, as well as a cost-benefit analysis of potential upgrades. The tool allows users to identify ideal locations for surveillance gadgets and investment in security features such as walls, high fences, barriers, further training, reinforced doors, or better policies. RAM-D takes specific aspects into consideration during the risk assessment. Firstly, the mission of the asset in question is important to the analysis. The mission is important because it guides the users to identify certain events that may impede the achievement of this goal. Secondly, the critical assets’ attributes are listed for protection. The critical assets’ potential adversaries are also analyzed. Thirdly, the resource’s potential vulnerabilities are defined. The risk level that is tolerable is identified at this point. Fourthly, the tool highlights the ideal technologies that can be used for upgrades. Fifth, the available mitigation options are explored alongside alternatives for risk reduction. Finally, the cost and operational impacts are highlighted as well (Harrald, 2004).
In most instances, the methodology relies on the resource’s sketches and layouts.
The main risk mitigation suggestions arising from the methodology include decreasing the adversary’s success and emergency evacuation improvement. However, it is impossible to quantify the risk of adversaries such as terrorism. Regardless of the absence of data, the risk of an attack is held constant through the method’s use. Thus, RAM-D requires constant revision of identified threats, vulnerabilities, and the chosen mitigation strategies. In addition, RAM-D fails to factor in the interdependences of the resources, such as water sources that flow downstream, which require interdependent analyses (Harrald, 2004).
Threats, Challenges, and prioritization
The main threats that face the Colorado River include less downstream flow, increasing water temperatures, high salinity, loss of critical sediments, plumbing activities, possible pollution, loss of natural habitats, and increasing endangered species loss (Hall, 2020). These threats result from a combination of climatic factors such as global warming and human activities. Human activities are most controllable and can be addressed immediately to mitigate the resulting vulnerabilities. These threats variably impact the nodes, assets, network, and sector. For instance, the reliability of the Colorado River as a source of drinking and farming water has reduced significantly. This impact manifests through a reduced flow of water downstream. In addition, the loss of natural habitats and increased salinity, as well as water temperature, affect the aquatic species. The potential pollution due to plumbing and farming activities increases the risk of water contamination, which may affect public health.
Controlling plumbing activities along the lower Colorado is one of the critical mitigation measures that can be used to reduce human activities. This strategy should reduce the amount of water that is redirected to farms (Hall, 2020). The Colorado River network also requires stringent policies that regulate the water that flows back into the river from the farms to avoid pollution. In addition, it is necessary to repopulate the riparian vegetation along the Colorado River Network. This vegetation is critical in supporting the species’ habitats along the river. Most importantly, it is necessary to train residents along the Colorado River as well as farmers who rely on the resource for farming on the need to protect it. During training, the key stakeholders should also raise awareness regarding strategies to avoid pollution. The costs associated with implementing the said mitigation measures include finding alternative sources of farming water, standardization of plumbing materials to monitor pollution from flow back, and purification of water downstream to avoid affecting public health negatively. The other cost involves the spreading of seeds on the riparian area of the river to repopulate the vegetation.
III. Asset or Network Allocation Model in the US Transportation System
The table below is an illustration of the proposed allocation for the Amtrak train network. The total budget amounts to $73.1 billion. It is intended to improve the accessibility of the network, ease of use, safety, reliability, and connectivity to other parts of the transportation network.
Purpose | Allocation |
Repairs of railroads | $10 billion |
Expansion | $12 billion |
Construction of new tunnels at Hudson River | $11.6 billion |
Replacement of the Baltimore & Potomac Tunnel | $4.5 billion |
Construction of alternative routes | $25 billion |
Enhancement of communication networks at the stations | $10 billion |
Training of employees | $5 billion |
Total budget | $73.1 billion |
The rationale for any budget or resource allowances:
The construction of alternative railroads that feed into the current nodes and links has the greatest allocation because it has the potential to offer continuity when the various threats affect other links. The idea is to construct alternative routes in areas of the network where uncontrollable threats are most likely to occur. The expansion of the current links is also highlighted as important, alongside the setting up of new tunnels at the Hudson River. In addition, enhancing communication networks is important for sharing information with different nodes. Finally, training employees on the safety of the entire network as well as the replacement of the Baltimore and Potomac Tunnels (Wang, Xue, Zhao, & Wang, 2018). These changes are expected to increase efficiency and reduce the network’s backlog for repairs and expansion (Lazo, Still, & Karklis, 2021).
Recommendation
The installation of surveillance equipment is still necessary despite the difficulties that the infrastructure presents. It is necessary to innovate strategies that can be used to monitor the links for any vulnerabilities and threats occurrence. This plan requires intense planning due to the cost and labor associated with it.
Conclusion
The transportation network is critical for the movement of people and goods. Its resilience, connectivity to other forms of transportation, ease of use, accessibility, and safety are dependent on the protection measures. The government is responsible for collaborating with the private sector players to ensure protection from various threats and vulnerabilities. The same applies to the Lower Colorado River network, whose risk assessment is conducted using RAM-D methodology. The budgetary allocations should ensure that the network’s aspects are improved significantly.
References
DHS. (2021). Critical Infrastructure. Retrieved from Homeland Security: https://www.dhs.gov/science-and-technology/critical-infrastructure
Evey, L. (2001). DOD News Briefing on Pentagon Renovation [Interview transcript]. U.S. Department of Defense. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=1636
Hall, S. (2020). Colorado River Is in Danger of a Parched Future.
Harrald, J. R. (2004). Review Of Risk-Based Prioritization/Decision-Making Methodologies For Dams. Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.367.1996&rep=rep1&type=pdf
Lazo, L., Still, A., & Karklis, L. (2021). Amtrak is a top travel choice in the Northeast. With an ally in the White House, it wants trains in the rest of America. The Washington Post.
Moteff, J. (2005). Risk Management and Critical Infrastructure Protection: Assessing, Integrating, and Managing Threats, Vulnerabilities and Consequences. The Library of Congress. Retrieved from https://sgp.fas.org/crs/homesec/RL32561.pdf
National Academy of Sciences. (2021). RES2013-27: All Hazards Risk Assessment of Critical Transportation Infrastructure in the State of Tennesse: Part 1 Identification of the Top Ten Critical Transportation Assets. Retrieved from https://rip.trb.org/view/1765656
Wang, L., Xue, X., Zhao, Z., & Wang, Z. (2018). The Impacts of Transportation Infrastructure on Sustainable Development: Emerging Trends and Challenges. Int J Environ Res Public Health., 15(6). doi:10.3390/ijerph15061172
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
I. Introduction to Fundamental Concepts of CI
A. Transportation Network as an essential infrastructure in the US
1. What is Critical infrastructure?
2. Identify the importance of critical infrastructure protection
3. Vulnerabilities and threat assessment
4. Measures to ensure assets and resilience
II. Preliminary Assessment of Primary Threats, Vulnerabilities, Risks and Strategy
A. Preliminary Assessment: Primary threats
1. Vulnerabilities and Risks
2. Concepts of Protection and resilience
III. Understanding Vulnerabilities using the Lower Colorado River Dam
A. The Colorado River Network as an important yet endangered source of water: Based on John Harrald (et al.) article titled “Review of Risk-Based Prioritization/Decision-Making Methodologies for Dams,” independent research:
1. Threats, Challenges, and prioritization
2. Impact of threats to the nodes, assets, network, and sector
3. Realistic Mitigating Measures
B. Properly reference the source of your RA methodology:
1. Using tables, graphs, lists, or whatever format, clearly deliver the results of this RA: Describe how it works
2. Complete Analysis of these assets.
3. Costs associated.
4. Identify the greatest risks
5. Report Findings
IV. Asset or Network Allocation Model in the US Transportation System
1. Working on the allocation model
2. Application of the allocation model to the asset or network of choice
3. What resources will be applied, and what will the concrete outcome be?
4. Impact on other critical infrastructure priorities in the community or company.
V. The rationale for any budget or resource allowances:
1. Budgets e.g., training cost per person
2. Ideas and measures
VI. Recommendations on:
A. Any rationale for any budget or resource allowances used
B. Provide recommendations for programs that will help the nation to protect and improve resiliency in the nation’s transportation network
VII. Conclusion
References
Evey, L. (2001). DOD News Briefing on Pentagon Renovation [Interview transcript]. U.S. Department of Defence. http://www.defense.gov/transcripts/transcript.aspx?transcriptid=1636
Harrald, J. R., Renda-Tanali, I., Shaw, G. L., Rubin, C. B., & Yeletaysi, S. (2004). Review of risk-based prioritization/decision-making methodologies for dams. The George Washington University Institute for Crisis, Disaster, and Risk Management.
And other scholarly sources.