Assignment 2: Critical Infrastructure Protection

1124 words - 5 pages

Assignment 2: Critical Infrastructure Protection
Benard Braxton, Jr.
Dr. Bouaffo Kouame
CIS 502 – Theories of Security Management
May 17, 2015

The Department of Homeland Security’s vison is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards (DHS, 2015). To achieve this vision there are three key concepts that creates the foundation of our national homeland security strategy. They are security, resilience, and customs and exchange (DHS, 2015).
These key concepts drive wide-ranging areas of action that the Quadrennial Homeland Security Review process describes as homeland security missions. These missions are not restricted to the Department ...view middle of the document...

Without money, food, drinking water, or electricity, society would shut down. So emergency and intelligence services, business enterprises, and public bodies are working together closely to protect these needed services, goods and processes. They increase the knowledge about how important sectors are interdependent, improve security against theft or sabotage, organize for a flu pandemic, continuity plans help critical sectors continue operating; cooperate more closely with current sectors and the police and safety regions (Protecting critical infrastructure, 2015).
The Department of Homeland Security conducts evaluations on communities and infrastructure to help local government officials and businesses make decisions about the location of resources to improve security before an incident and recovery after an incident. The Department of Homeland Security also works with communities and businesses with limited resources to offer training and other tools to instruct the broader community on the need for critical infrastructure resilience and security, and to improve their current efforts (What We Do, 2015).

Our country’s safety relies upon resilient and secure critical infrastructure. The National Infrastructure Protection Plan (NIPP) outlines how private sector and government participants in the critical infrastructure community collaborate to achieve security, manage risks and resilience outcomes (National Infrastructure Protection Plan, 2013). NIPP offers a modernized approach to critical infrastructure resilience and security, focuses on integration of physical and cyber security efforts, a closer arrangement to national preparedness efforts, focus on cross jurisdictional and cross sector coordination to achieve better results, integration of information-sharing as an important element of the risk management framework, identifies the key role and knowledge of critical infrastructure operators and owners, integrates hard work by all levels of government, nonprofit, and private sectors by offering an inclusive partnership framework and identifying exclusive capabilities each participant brings to the national effort, replicates today’s integrated all-hazards environment, grounded in existing policy and business principles, and pushes action in the direction of long-term improvement (National Infrastructure Protection Plan, 2013).
The National Institute of Standards and Technology (NIST) is a federal agency under the sponsorship of the Undersecretary for Technology. It is concerned with developing technology and maintaining measurement standards to improve promote commerce, productivity, and improve the quality of life in the U.S. NIST oversees four major cooperative programs. The NIST Laboratories advances the national technology infrastructure. The Baldridge National Quality Program was created to boost distinction among United States manufacturers, health-care companies, service providers, and educational...

Other assignments on Assignment 2: Critical Infrastructure Protection

Cloee Essay

332 words - 2 pages to two (1-2) page paper that addresses: 1. Determine the investigation you will do with regard to the physical infrastructure of the orchards, orchard shacks, and the cold storage building. 2. Make a list of business goals for Harriet’s Fruit and Chocolate Company and determine the constraints that will affect these goals. 3. Make a list of technical goals for Harriet’s Fruit and Chocolate Company and determine the tradeoffs you might need to

Research Papper Essay

309 words - 2 pages these three faiths with that of the Christian perspective and your own personal perspective. In 1,250 -1500 words, summarize your findings, and compare and contrast the different belief systems, reinforcing major themes with insights gained from your research. Some of the questions to consider when researching the chosen religions are: 1. What is the spiritual perspective on healing? 2. What are the critical components of healing, such

Terracog Gps Case

4326 words - 18 pages COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to

E-Marketplace, E-Mall, E-Tailing

596 words - 3 pages Contrast e-marketplaces, e-malls, and e-tailing. Illustrate how they are different from physical marketplaces, malls, and retail outlets. Compare the tools and techniques for a successful e-commerce presence. This assignment tests your analytical and critical thinking skills and your ability to synthesize concepts around topics. The paper should be in APA format, 2-3 pages (not including reference page), with at least two references

Information Systems Security

3283 words - 14 pages , standards, guidelines and procedures; enabling an automated antivirus protection solution like AVG Antivirus Business Edition that scans and updates individual workstations with proper protection (Kim & Solomon 2012). The third component in the IT infrastructure that we would like to introduce is the local area network (LAN) domain which is a collection of computers connected to one another or to a common connection medium. Network connection

Aircrafts

2440 words - 10 pages are and then what our current hardware assets would be if we virtualized the IT infrastructure. Now Virtualization Router 2 3 Switch 1 4 Firewall 1 4 Server 5 1 Virtualization will bring much needed change, but the most significant change would be the use of Firewall protection and the reduction in the total number of servers. It is proposed that a public router be installed to handle the inbound traffic (contractors, customers

Desert Survival

296 words - 2 pages was based on fleeing these conditions as quickly as possible. The longer we are in the situation the higher the risk becomes. If there are only enough supplies to last a short period of time then it is critical to get out of those conditions rapidly. My fourth choice was for the protection of the group against wildlife. Surly one night spent in a desert is enough time to encounter dangerous wildlife. The pistol is important for protection and to

Big Data

1023 words - 5 pages New Privacy Issues Related to Cyberspace Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Competencies: Critical thinking, communication skills Select three organizations within the same industry from the list below and     1.    Briefly describe the organizations and their missions (stated on their web site).     2.    Identify and list the similarities and differences

Management And Leadership

3168 words - 13 pages conclusion of each workshop. Points will be allocated based on specific criteria and assignment. The assignments are grouped into four categories; individual graded assignments, participation in on-line discussions, individual projects, and team projects. Points for each assignment are calculated using the charts shown in this section. | |Workshop One |Workshop Two |Workshop Three |Workshop Four |Workshop Five

Assignment 4: Disaster Recovery Team

958 words - 4 pages Officer * Network Services Recovery Data Networks - Recovery of voice and data network infrastructure. Includes recovery of hardware components, connectivity to the recovery site and recovery of critical network software. * Server Recovery Technical Services - Recovery of critical servers. (Seaton, 2013) (txc.com, 2013) Activation of Plan of Disaster Recovery Plan The organizations CEO, an appointee, or successor may activate this plan

Network Infrastructure

5792 words - 24 pages To192.168.1.6 | 192.168.1.7 | INSTALLING AND AUTHORIZING A DHCP SERVER Dynamic Host Configuration Protocol (DHCP) is the role that has to be installed to allow automatic assignment of IP addresses to client computers. Therefore, a DHCP server has to be installed for this UWS network and used in the automatic assignment of the above designed addressing plan. 1. To install DHCP, from server manager, add roles then select DHCP server 2

Similar Documents

Sno' Risk Program Essay

431 words - 2 pages Assignment 2 Frederick Huff Managerial Application of Technology Abstract Chairman and Chief Executive Officer Ursula M. Burns, outlined Xerox past and future in her Shareholders letter. Since the acquisition of Affiliated Computer Services five years ago, the company has made move to position itself as a critical service provider to companies in there key business operations. Xerox has targeted fortune 100 level companies to expand into the

Post Implementation Review Assignment #3 Description Of The Relevant Information Technologies

343 words - 2 pages Description of the relevant information technologies Post Implementation Review Assignment #3 Description of the relevant information technologies Overview: In this third assignment of the post-implementation review, student teams will describe the technical infrastructure of the information system project that is being studied (3-4 pages) by responding in detail to the following questions. What hardware/operating system platform is being

Paper

1103 words - 5 pages objectives help the student understand what the topic is about and what they student should know after completing the assignment. If the student can answer the objectives then they can complete the assignment successfully. 2. Describe what needs to be done for the assignment found in the sample syllabus? To complete the assignment the student has to identify three components they feel are the most critical to the formation of worldview. They

Hum115 R4 W1 Levels Steps Worksheet

649 words - 3 pages University of Phoenix Material Week 1 – Levels and Steps of Critical Thinking Worksheet Note. This is a three-part assignment. Please ensure you complete all three parts. Part 1: Critical Thinking Distribution Complete the following True/False questions about Beginning Critical Thinker, Average Critical Thinker, and Advanced Critical Thinker. Refer to pp. 13-15 in Ch. 1 of Critical Thinking in Everyday Life. 1. True