Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Concept of leaky software, data pouring out of pipe. Photo by the_lightwriter/Fotolia

    Commentary

    Digital Theft: The New Normal

    Oct 10, 2016

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013, photo by Capt. Darin Overstreet/U.S. Air National Guard/Handout via Reuters

    Report

    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Jul 12, 2016

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future due to the effects of sea level rise and changes in temperature and precipitation patterns.

Explore Critical Infrastructure Protection

  • Periodical

    RAND Review: November-December 2017

    This issue highlights recent RAND research on post-9/11 military caregivers; RAND-Lex, a computer program built at RAND that can analyze huge data sets of text; and the implications of climate change on Arctic cooperation.

    Oct 19, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Building our Connected Society: Findings from the 2017 Thought Leadership programme

    This report summarises the key themes that emerged from four thought leadership sessions on the UK's connected society, along with recommended actions moving forward for the UK government, industries, the third sector and the public.

    Oct 11, 2017

  • Tool

    Roadmap to Succeed in the Open for the National Geospatial-Intelligence Agency's Human Development Directorate

    This tool provides the National Geospatial-Intelligence Agency's Human Development Directorate with a roadmap for how employees can overcome the hurdles to achieving the agency's missions outside of secure and classified environments.

    Sep 26, 2017

  • Migrants at the Anti-Illegal Immigration Authority in Tripoli, Libya, September 10, 2017

    Commentary

    Addressing Europe's Migrant Crisis Takes More Than Stopping the Boats from Libya

    Treating migration from Libya as a border security issue has reduced migration across the Mediterranean. But efforts to keep migrants in Libya are fraught with risks, exacerbate a massive human rights problem, and do not address Libya's long-term economic and political stabilization.

    Sep 25, 2017

  • Soldiers with U.S. Army Cyber Command take part in network defense training

    Report

    How the Army Can Retain Its Cyber Expertise

    Projected earnings for information security analysts with characteristics similar to those of enlisted soldiers are comparable with military pay. But retention efforts may be hampered by soldiers' perceptions of civilian opportunities.

    Sep 18, 2017

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

    Sep 15, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Girl Scouts compete in the Mission Ocean Challenge during the USS California Science Experience at Naval Surface Warfare Center, November 6, 2010

    Commentary

    Cybersecurity Badge: One Big Step for Girl Scouts, Potentially Giant Leap for Women

    The Girl Scouts will start offering 18 cybersecurity badges next year. In addition to exposing girls to cyber concepts and challenges, this could encourage them to pursue cybersecurity or other STEM careers in which women are underrepresented.

    Aug 3, 2017

  • Journal Article

    Impact Assessment of Specific Measures Aimed at Increasing Transparency and Engagement in EFSA Risk Assessment Process

    The main objective of the study was to assess the impact of a set of measures identified by EFSA to promote trust and confidence in EFSA's risk assessment process.

    Aug 1, 2017

  • Russian President Vladimir Putin speaks during a news conference after the G20 summit in Hamburg, Germany, July 8, 2017

    Commentary

    Russian Information Warfare: A Reality That Needs a Response

    For the last three decades, Russia has exploited its growing capabilities in cyberspace to spy on, influence, and punish others. The West will continue to struggle to hold Moscow accountable, in part because international law falls far short of fully defining the rules or resolving conflicts.

    Jul 21, 2017

  • The Washington Monument on the National Mall in Washington, D.C.

    Commentary

    How to Harden America's Soft Targets

    The U.S. government must choose where to apply limited resources to defend soft targets. But it could expand its information-sharing efforts with other governments and local law enforcement. Broad intelligence sharing and more training could help identify potential attackers before they can execute their plans.

    Jul 5, 2017

  • Peter Norton attending a Center for Global Risk and Security Advisory Board meeting in October 2008

    Content

    Peter Norton: Entrepreneur, Art Collector, and RAND Advisory Board Member

    When the Saudi kingdom hired RAND in the 1980s to advise its information technology industry on the best bets for future investment, RAND researchers consulted expert Peter Norton to back up their findings. Norton has supported RAND ever since.

    Jul 3, 2017

  • Report

    Cyber Power Potential of the Army's Reserve Component

    Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component soldiers available to support the Army's cyber mission needs.

    Jun 15, 2017

  • Global network and information connection

    Report

    Social Media Analysis Could Support Information Operations

    Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If DoD seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.

    Jun 14, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • A young man is frustrated by the WannaCry ransomware attack

    Commentary

    WannaCry Virus: A Lesson in Global Unpreparedness

    The WannaCry ransomware attack provides important lessons about how to secure cyber networks. History indicates that other attacks will follow. Preparedness is crucial.

    May 22, 2017

  • Kampala street food vendor Monica Kayagi makes a recipe during the Superfoods Cook-Off in December 2016

    Commentary

    What Street Food Vendors in Uganda Need to Succeed

    Street vendors in Kampala, Uganda, would benefit from infrastructure development, food safety standards, rules of hygiene, and greater focus on healthy products. The city's growing population also would benefit from increased access to nutritious and affordable foods.

    May 16, 2017

  • Ugandan chefs display their creations at the first Superfoods Contest in December 2015

    Commentary

    A New Ugandan Cuisine: Showcasing Superfood Qualities of Millet and Sorghum

    The results of a series of cooking contests in Uganda to promote the use of drought-tolerant, nutritious traditional grains—millet and sorghum—signal that a new food trend may be on the horizon.

    May 9, 2017

  • Topic Synonyms:
  • CIP