Response to Peer Post (23)
Response to Peer Post
Author’s Name
Institutional Affiliation
Response to Peer Post
You have done a great job in using the red team analysis to analyze vulnerabilities in the context of the Cushman Hydro Project power plant. It is interesting to see that while justifications are supposed to ease the operations of the project, multiple justifications cause vulnerability to this power plant by bringing about complications regarding security ownership. It would not be a surprise these jurisdictional complications could translate to financial and operational risks to the power plant. I observe that you pointed political tensions as another vulnerability that jump out at you relative to this power plant, which is quite an interesting point.
I do agree with your assertion that these tensions could be exploited by exacerbating the license-centered disagreement between the agencies involved and the two tribes living near and using the dam for fishing. Indeed, I tend to think that this point clearly corroborates the idea that the multiple jurisdictions you mentioned earlier are not dealing with the actual problems that need to be addressing, and instead, they are just making the situation worse. I am intrigued by the comprehensive list of options you have provided for this power plant to consider for security posture improvement. For me, the most imperative options is to monitor access control because it covers other option relating to preventing unauthorized entry into the power plant.


