Free Essay SamplesAbout UsContact Us Order Now

National Protection Frame Work

0 / 5. 0

Words: 275

Pages: 1

133

National Protection Framework
Name of Student
Institution Affiliation

Introduction
The National Protection Framework was created in the US with the objective of strengthening the potential to block threats due to terrorism, natural calamities or any other possible hazards against the United States (Logan, 2018).
Ramsay and Kiltz (2014) describe the key expectations coming out of this framework.
Intelligence sharing
Extends speedy, precise, and actionable information to prevent any possible threats to the nation, its people, installations or interests.
The key parameters include creation, expansion or application of weapons of mass destruction.
Information sharing
Is the capability to exchange intelligence and other information; data; or knowledge among key stakeholders.
They include local, state, tribal, territorial, Federal, or private sector entities, or international partners as appropriate.
Screening, Search, and Detection involves locating dangers or risks through active and passive monitoring and search methods.
Interdiction and Disruption involve deferring, deflecting, thwarting, stopping, apprehending, or securing threats and risks.
Forensics and Attribution come under the prevention category connected with the process to investigate and attribute possible threats.
Planning addresses the creation of multidisciplinary action items, execution, exercising, ownership; and the advancement of planning programs.
Public Information and Warning employs practical and retrievable indications and warning applications to inform potent attacks and dangers to government dignitaries, security staff and the public.

Wait! National Protection Frame Work paper is just an example!

Access Control and Identify Verification depends on the execution and sustainment of protocols to ascertain and permit, or block physical and cyber access to identified areas, data, and networks.
Cybersecurity function guarantees the security, dependability, credibility, and readiness of important data and services through a collaborative model.
Physical Protective Measures involves limiting the risks that include threats, vulnerabilities, by restricting the movement and safeguarding borders, critical establishments and the homeland.
Risk Management for Protection Programs and Activities takes care of finding, evaluating and classifying risks to protect investments.
Supply Chain Integrity and Security depends on ascertaining and making robust key nodes, approaches of delivery between nodes, and inventory s in transit between a supplier and receiver.
Operation Coordination create the platforms to develop and furnish core capabilities.

References
Logan, K. G. (2018). Homeland security and intelligence. Santa Barbara, CA:
Praeger, An Imprint of ABC-CLIO, LLC.
Ramsay, J. D., & Kiltz, L. A. (2014). Critical issues in homeland security: A
casebook. Boulder, CO: Westview Pressp.

Get quality help now

Top Writer

John Findlay

5,0 (548 reviews)

Recent reviews about this Writer

I’ve been ordering from StudyZoomer since I started college, and it is time to write my thankful review. You’ll never regret using this company!

View profile

Related Essays