National Strategy for the physical protection of key infrastructure and key assets

The national Strategy for physical protection of key infrastructure and key assets involves protection from both internal and external threats. An example of an external threat is the 9-11 attacks which are well remembered in the history of Americans. In the National strategy, the objectives, the mission and the importance of the infrastructure are well defined. In addition to all these, the importance of the key infrastructure to Americans is well listed and documented so that they can understand why the process is important. In the strategy, all they key infrastructure in America is listed in a way such that it can be understood by any American. In addition, the statement of national policy is given, to make the understanding of the strategy better. The guiding principles are also well listed. Some of the guiding principles include; to assure people of their safety and confidence, to establish responsibility and accountability, to encourage partnership between government sectors and industries and also among industries, to facilitate meaningful information sharing, to foster international relationship, to develop technologies aimed at combating terrorist threats and to safeguard privacy and constitutional freedoms. The Strategy involves both the local and national governments, and their role in either case is well stipulated (The National Strategy for Physical Protection of Critical Infrastructure and Key assets, 2003). The private sector also has some responsibilities in the protection f key infrastructure according to the structure. These responsibilities are also well stipulated

The National strategy was created in the year 2003 in the month of February. The strategy was created by the government at the time, in collaboration with the key municipalities and also the key role players in the private sectors. The main reason why it was created was the realization that America, following the terrorist attack, 9-11, did not have adequate infrastructure to protect itself from external threats. There was also a growing desire to protect the people of America from internal threats that were now becoming a reality at the time. Apart from aiming at the protection of the people, there was the need to protect the key infrastructure and other key assets, such as workplace buildings, roads, neighborhoods among others from external threats. These had cost the government a lot of money previously and they needed to make sure it did not cost that much in the future.

Don't use plagiarized sources. Get Your Custom Essay on
National Strategy for the physical protection of key infrastructure and key assets
Just from $13/Page
Order Essay

Communications are addressed in the strategy documentation in a number of ways. For example, according to the documentation, the information from government agencies should be protected at all times. This means making sure that such information does not get into the wrong hands. It also making sure that key sectors in the government have updated communication policies on their internet and social media sites (Homeland Security, 2001). In general, these sites and agencies have to make sure that the public understands the difference between the information that comes from the government. Some crucial information that could place the government in danger is also generally well protected. This makes sure that everything is well protected.

Interrelationship of infrastructure sectors refers to the ways in which the infrastructure between various sectors is interrelated. The infrastructure can be interrelated either by the physical proximities or by the virtue of functions that each carry out (O’Rurke, 2007). These interrelationship should be recognized, as often, infrastructure that is in close to other may affect the others. An example is the case of underground water pipelines. These are usually close to mining centers in some areas. A collapse of the mining centers means that these pipes also collapse, or are affected in one way or another. An example of functional interrelationships is the electricity and the pumping industries. The electrical industries need the water pumping industries, while at the same time, the pumping industries need the electrical industries.

Disruptions of one sector in the infrastructure industries often affect other sectors. For example, if the transport industry is compromised, it is likely that many other industries will be affected. Goods and services, that may sometimes be perishable will often not be delivered in time and this affects the agriculture industry. These examples, show a good relationship in the interdependency of each sector. They can be summarized as; the relationship between the transport and the agriculture industry, the interrelationship between the pipeline and the mining industries (O’Rurke, 2007). Understanding these relationships is key to understanding why their security is important. It is also key to understanding why the government ought to play a role in the protection of threes industries.

Stakeholders in each industry can do a number of things to protect themselves. One of the things is making sure they cooperate with the government in making sure that the threats are identified and addressed. Another is to hire security personnel that are well trained on matters of national security. This makes sure that the people who generally would do bad things do not do these bad things. Finally, they can make sure their privacy and security is well protected. They should consider all the information that they share in doing this. With technology, it is becoming easier to share information online. This can be dangerous as malicious people may attempt cyber attacks. Stakeholders in the various industries should therefore make sure that their online systems have strong firewalls to protect them from perceived threats (Mortef & Parfomak, 2004).

In conclusion, the National Strategy for the physical protection of key infrastructure and key assets has been discussed. From the discussion, the assets and infrastructure have been listed. The various stakeholders and their roles have been explained. In addition, the technology that can be used in these forms of protection has been explained. The aim of the Strategy has also been clearly explained


Homeland Security. (2001) national Strategy for Physical Protection of Critical Infrastructure and Key Assets Retrieved 17 October 2016 from 

Moteff. J & Parfomak. P. (2004) Critical Infrastructure and key Assets: Definition and Identification. CRS Report for Congress. Congressional Research Service. The Library of congress

O’Rurke. T. D,( 2007) Critical Infrastructure Interdependencies, and Resilience. Retrieved October 17, 2016 from 

The National Strategy for Physical Protection of Critical Infrastructure and Key assets. (2003) The National Strategy for Physical Protection of Critical Infrastructure and Key assets

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE