InfoGram

This page may contain links to non-U.S. government websites. What this means to you »

October 11, 2001

NOTE: This InfoGram will be distributed weekly to provide members of the emergency services sector with news and information concerning the protection of their critical infrastructures. For further information please contact the U.S. Fire Administration's Critical Infrastructure Protection Information Center at (301) 447-1325 or email at usfacipc@dhs.gov.

Critical Infrastructure Countermeasures

The 4 October InfoGram continued the explanation of critical infrastructure protection (CIP) by reporting on the fourth step in the protection process. It initially reviewed that identifying critical infrastructures is the first step, determining the threat against those infrastructures is the second step, and analyzing vulnerabilities is the third step. The same InfoGram continued that assessing risk is the fourth step, which involves the comparison of threats and vulnerabilities to determine the potential risk of the degradation or loss of a critical infrastructure. When it is established that one or more infrastructures are threatened and vulnerable and, therefore, at high risk of degradation or loss, then the CIP practitioner proceeds to the fifth step of the CIP process: applying countermeasures. Countermeasures are any actions that reduce or prevent the loss of a critical infrastructure to an identified threat. They protect infrastruct and preserve the ability of emergency first responders to efficiently perform their services.

In this final step of the process, the CIP practitioner must weigh the loss of a critical infrastructure on mission success against the cost of implementing protective measures. Possible countermeasures differ in terms of feasibility, expense, and effectiveness. They can be simple or complex actions limited only by imagination and creativity. For example, to protect their personnel infrastructure, all FDNY digital radios will be inexpensively reprogrammed so that one channel will override all others and emit a long tone to warn each firefighter to immediately evacuate a building. Another easy and no cost example of a countermeasure is the growing number of departments that keep their apparatus bay doors closed at all times.

Decisions regarding the application of countermeasures will certainly influence personnel, material, and financial resources. These same decisions will inevitably drive a department's security budget as well as their associated action plans. Therefore, senior department leaders have the responsibility to allocate necessary resources when and where risk is unacceptable. Sometimes, prohibitive costs or other factors make it impossible to apply corrective measures. In such cases, senior department leaders must knowingly accept risk of the possible loss of a critical infrastructure. CIP experts advise that high risk physical or cyber systems should be considered a loss to plans and operations if not protected.

Infrastructure Protection Alert

Because of the prominent role the federal government has assigned to critical infrastructure protection, the National Infrastructure Protection Center (NIPC) issued a nationwide alert (7 October) to emergency first response agencies and all owners of national critical infrastructures to prepare for retaliatory attacks following allied military strikes against terrorist targets in Afghanistan. A NIPC spokesperson said the alert serves to encourage "heightened awareness for the security and safety of our nation's critical infrastructures." Security officials expressed concern, however, that the interdependent nature of national infrastructure systems means that failure in one sector could lead to serious problems in the others. Therefore, the fire and emergency medical services are urged to maintain the highest level of vigilance and to make daily evaluations regarding whether additional security measures are warranted.

Cybersecurity Key to Homeland Defense

Much of the reaction to the terrorist attacks has focused on physical systems and security (e.g., people, airports, government buildings, petrochemical pipelines, refineries, water reservoirs, etc.). But, while the Office of Homeland Defense takes shape, both government and private technology experts are urging that cybersecurity be included as a key to national security. A NIPC official stated that protection coordination between physical and cyber systems is absolutely essential. He emphasized that given the degradation of telecommunications after the 11 September attacks, "the Internet was the most reliable way to communicate." Therefore, leaders of the fire and emergency services community are reminded to give adequate attention to the protection of their cyber systems as well as the physical ones.

Effective Cybersecurity Layers

In an article seen at FederalComputerWeek.com, Maggie Biggs wrote that some technology managers assume an intrusion detection system will solve their security woes. She insisted that "nothing could be further from the truth." However, she wrote, "when intrusion detection solutions are deployed along with the other six security layers, they form a security system that leave agencies well prepared to combat cyberattacks." Ms. Biggs reported that the most effective cybersecurity models combine the following layers:

USFACIPC Weekly Lexicon: Network

(adapted from the Critical Infrastructure Glossary of Terms by the Critical Infrastructure Assurance Office)

An information system implemented with a collection of two or more interconnected nodes for the purpose of data transfer.

Disclaimer of Endorsement

The U.S. Fire Administration/EMR-ISAC does not endorse the organizations sponsoring linked websites, and does not endorse the views they express or the products/services they offer.

Fair Use Notice

This INFOGRAM may contain copyrighted material that was not specifically authorized by the copyright owner. EMR-ISAC personnel believe this constitutes "fair use" of copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use copyrighted material contained within this document for your own purposes that go beyond "fair use," you must obtain permission from the copyright owner.

Reporting Notice

DHS and the FBI encourage recipients of this document to report information concerning suspicious or criminal activity to DHS and/or the FBI. The DHS National Operation Center (NOC) can be reached by telephone at 202-282-9685 or by email at NOC.Fusion@dhs.gov.

The FBI regional phone numbers can be found online at www.fbi.gov/contact/fo/fo.htm

For information affecting the private sector and critical infrastructure, contact the National Infrastructure Coordinating Center (NICC), a sub-element of the NOC. The NICC can be reached by telephone at 202-282-9201 or by email at NICC@dhs.gov.

When available, each report submitted should include the date, time, location, type of activity, number of people and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact.

RSS FeedWeekly INFOGRAM's are now available as an RSS Feed. More Information »