Posted: January 4th, 2023

CASE STUDY (Critical Infrastructure Vulnerability and Protection: An Introduction)

Critical infrastructure refers to the systems and assets that are essential to the functioning of a society, such as transportation networks, communication systems, and power grids. These systems are vital to the well-being and security of a society, and their disruption or destruction can have serious consequences. Because of this, it is important to identify and address vulnerabilities in critical infrastructure, as well as to implement measures to protect these systems from threats.

There are many different types of threats that can pose a risk to critical infrastructure. These can include natural disasters, such as earthquakes and hurricanes, as well as man-made threats, such as cyber attacks and terrorism.

One way to protect critical infrastructure is through the use of physical security measures, such as perimeter fencing and security personnel. These measures can help to deter potential threats and make it more difficult for unauthorized individuals to access critical infrastructure.

Another important aspect of protecting critical infrastructure is ensuring that these systems are resilient and able to withstand potential threats. This can involve things like designing infrastructure to be able to withstand natural disasters, or implementing redundant systems that can take over in the event of a failure.

In addition to physical security measures and system resilience, it is also important to have robust plans in place for responding to and recovering from disruptions to critical infrastructure. This can include things like emergency response plans and backup power systems.

Protecting critical infrastructure is a critical responsibility, as these systems are essential to the functioning of society. By identifying vulnerabilities and implementing measures to address them, we can help to ensure the security and resilience of our critical infrastructure.
MODULE #1 CASE STUDY (Critical Infrastructure Vulnerability and Protection: An Introduction)


You will be referring to the required readings, videos, and websites to address the assignments. Additionally, you can also research other professional sources available on the internet.

NOTE: This research paper should have an Introduction and a conclusion. The first paragraph should tell the reader what the research will show, “This research will show______________ .”

What was your conclusion? What are best practices based on your research?


1) From the NIPP of 2013, what is meant by “Partnership Structure?” Give an example.

2) Choose one of the 16 Critical Infrastructure Sectors and comment on its Sector Specific Plan. What other sectors is it closely linked to? Why? How?

3) Explain SCADA. Why is SCADA a popular target for terrorists? Explain and use quotations to support your statements.

Organization: Subheadings should be used to organize your paper according to question.

At least two references should be included from academic sources (e.g., peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). 

MODULE #1 BACKGROUND Required Readings, Websites, & Videos
Critical Infrastructure Vulnerability and Protection: An Introduction
Reading Expectation:
Though you may find some of your readings technical, you are not responsible for detailed knowledge, formulas, or other scientifically oriented material. The expectation is that you have a general working knowledge of the material.
Required Reading
InfraGard factsheet. (2018). FBI: Office of Private Sector. Retrieved from
Krambeck, D. (2015). An introduction to SCADA systems. All About Circuits. Retrieved from
Mandel, M., & McCormick, E. (2018). FERC approves supply chain risk reliability standards. Troutman Sanders. Retrieved from
NIPP 2013: Partnering for infrastructure security and resilience. (2013). retrieved from Read pages 1-14
Resiliency rules: 7 Steps for critical infrastructure protection. (2007). Slideserve. Retrieved from
The National Counterintelligence and Security Center. Insider threat mitigation for U.S. critical infrastructure entities: Guidelines from an intelligence perspective (2021, March). Read “Nine Elements of Insider Threat Programs.” pp. 12-17.
Required Websites
Critical Infrastructure Sectors.
Information Sharing: A Vital Resource for Critical Infrastructure Security and Resilience.
National Infrastructure Protection Plan.
Required Videos
Lavendaire, A. (2019, August 28). Time management tips: How to prioritize and be more productive. Retrieved from
TV6 & FOX UP. (2017, August 9). InfraGard [Video file]. Retrieved from
RealPars. (2019, June 3). What is SCADA? [Video file]. Retrieved from
This is an 8-minute video

Tags: , , ,

Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Why choose us

You Want Best Quality and That’s our Focus

Top Essay Writers

We carefully choose the most exceptional writers to become part of our team, each with specialized knowledge in particular subject areas and a background in academic writing.

Affordable Prices

Our priority is to provide you with the most talented writers at an affordable cost. We are proud to offer the lowest possible pricing without compromising the quality of our services. Our costs are fair and competitive in comparison to other writing services in the industry.

100% Plagiarism-Free

The service guarantees that all our products are 100% original and plagiarism-free. To ensure this, we thoroughly scan every final draft using advanced plagiarism detection software before releasing it to be delivered to our valued customers. You can trust us to provide you with authentic and high-quality content.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.