Federal computer systems are riddled with weaknesses that continue to put critical operations and assets at risk. New information security provisions introduced by Congress will be a major catalyst for federal agencies to improve their security program management. To help maintain the momentum that the new information security reform provisions have generated, federal agencies must act quickly to implement strong security program management. A key element of the strategy outlined in Presidential Decision Directive (PDD) 63 was establishing the National Infrastructure Protection Center as "a national focal point" for gathering information on threats and facilitating the federal government's response to computer-based incidents. The center has begun critical infrastructure protection efforts to establish a foundation for future governmentwide efforts. However, the analytical and information-sharing capabilities that PDD 63 asserts are needed to protect the nation's critical infrastructures have not yet been achieved.
According to the Dept. of Homeland Security (DHS), there are thousands of facilities in the U.S. that if destroyed by a disaster could cause casualties, econ. losses, or disruptions to national security. DHS issued the Nat. Infrastructure Protection Plan (NIPP) in June 2006 to provide the approach for integrating the nation's critical infrastructure and key resources. This report studied DHS's Jan. 2009 revisions to the NIPP in light of a debate over whether DHS has emphasized protection rather than resilience. The report discusses: (1) how the 2009 NIPP changed compared to the 2006 NIPP; and (2) how DHS addressed resiliency as part of their planning efforts. Charts and tables. This is a print on demand edition of an important, hard-to-find report.