Need Help With This Assignment?

Let Our Team of Professional Writers Write a PLAGIARISM-FREE Paper for You!

Network Analysis Completion

Network Analysis Completion

Critical infrastructure protection is an important aspect of network analysis. Based on the relationships that the network’s nodes and links share, it is possible to determine the actual threats and vulnerabilities (Ongkowijoyo & Doloi, 2017). This information provides a strong foundation for making recommendations that are likely to increase or maximize the protection of critical infrastructure. Timeliness is an important aspect in the creation of effective recommendations because time governs some of the threats, such as terror attacks and natural calamities. If the recommendations are provided in good time, they are likely to be more effective in mitigating the effects or eliminating the threat completely.

The clarity of the recommendations is based on the relationships within the network. Once the stakeholders understand the network’s mission and compare this to the current threats and vulnerabilities, it is possible to establish the most effective recommendations that will ensure the network achieves its mission efficiently. Strategy is critical in ensuring that recommendations are effective. Each recommendation needs to have a greater strategy that details implementation and considers the costs and human resources that are required (Lewis, 2006). Such clear information ensures that the implementers are successful to a significant extent. Most importantly, it is necessary to highlight the resource allowances and expected constraints. This information prepares the team for the stated obstacles and enables them to find solutions or alternatives that can overcome the hurdles while achieving the recommendations’ objectives.

Recommendations to improve the transportation network

One of the major threats that plague the transportation network is terror attacks. Increasing surveillance is important in battling the threat. Terrorists use the same modes of transport, links, and nodes that they attack (Żochowska & Soczówka, 2018). The presence of explosive material can be detected using various technologies, including scanning luggage and whole-body. Any suspicious luggage and individuals should be held until the doubt is eliminated. Such surveillance is standard in air transport. However, it is less common in other forms of transport, providing an opportunity for terrorists to use these for transit. Therefore, it is important to gradually install surveillance gadgets in different nodes of the various modes of transportation as a first phase. This should be constant and laborious initially but allows the stakeholders to mitigate the threats. In addition, the second phase should include the installation of surveillance in vehicles, ships, and railcars. This provides access to the actual happenings during transit.

Secondly, information sharing is critical because it prepares the stakeholders for certain eventualities. Intelligence regarding planned terror attacks enables the DHS agencies to avert the occurrences. This mitigates or eliminates the threat completely only if timely information is provided and action is taken in good time. The various intelligence agencies should ensure that they handle information with the confidentiality it deserves and only share it with the necessary stakeholders. Holding on to information that could potentially eliminate a threat endangers peoples’ lives, infrastructure, the economy, and goods. This recommendation also touches on the collection of information from the public. Acting on the information encourages the public to share more. Multidirectional information is encouraged to ensure that critical infrastructure partners are looped in the intelligence web. However, this process should be preceded by trust-building among the partners. Consistency is highly encouraged for efficient action. Training and the creation of standards and policies that govern the process are important for all participants (Homeland Security, 2016). Therefore, these two recommendations are expected to create significant improvement in terms of safety, connectivity, ease of use, resilience, and reliability.

References

Homeland Security. (2016). Critical Infrastructure Threat Information Sharing Framework. Retrieved from https://www.cisa.gov/sites/default/files/publications/ci-threat-information-sharing-framework-508.pdf

Lewis, T. G. (2006). Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. John Wiley & Sons.

Ongkowijoyo, C., & Doloi, H. (2017). Determining critical infrastructure risks using social network analysis. International Journal of Disaster Resilience in the Built Environment, 8(1).

Żochowska, R., & Soczówka, P. (2018). Analysis Of Selected Transportation Network Structures Based On Graph Measures. Scientific Journal of Silesian University of Technology. Series Transport, 98, 223-233. doi:10.20858/sjsutst.2018.98.21

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Network Analysis Completion

Network Analysis Completion

What do you believe provides a strong foundation for creating useful recommendations related to CI? -Consider relevance, acceptability, resource allowances or constraints, timeliness, salience, clarity, larger strategy, and so forth. If someone were making recommendations to you personally, what qualities might it take for you to be persuaded to employ these?
Share at least 2 fully detailed recommendations that you will make in your Key Assignment.
Explain the rationale for each recommendation and what outcome you foresee each one having to mitigate or overcome the challenges that you are targeting.