A Computational Asset Vulnerability Model For The Strategic Protection Of The Critical Infrastructure

1485 Words6 Pages
A Critical Review of “A Computational Asset Vulnerability Model for the Strategic Protection of the Critical Infrastructure” Article Summary of the Article A brief background of this article shows that it presents the doctoral works of Richard White on security under the supervision of Terrance Boult and Edward Chow. The article was published online by the “International Journal of Critical Infrastructure Protection.” In this paper, Richard White present a new computational model that can be of help in organizing for strategic protection of the key infrastructure in the US and elsewhere. Under the supervision of Terrance Boult and Edward Chow, R. White presents the Asset Vulnerability Model as a guide to be used in strategizing protection measures of the key infrastructures. The article begins by giving a brief introduction of the genesis of the problem whereby R. White, T. Boult and E. Chow identifies the September 11 attack as the genesis for a need to mitigate the vulnerability of the key infrastructures in the US. They build up a history of the progress that has been taking place since 2001 whereby in 2002, Homeland Security Act was enacted and mandated the Department of Homeland Security (DHS), with a prime obligation of protecting the Critical infrastructure in the US. The department developed a protection plan which is in use up to date. However, these authors point out that the plan was full of flaws according to a research conducted by National Research council of

More about A Computational Asset Vulnerability Model For The Strategic Protection Of The Critical Infrastructure

Get Access