Critical infrastructure protection

Assignment Help Basic Computer Science
Reference no: EM13806966

Assignment 2: Critical Infrastructure Protection

According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

You may use the following resources in order to complete the assignment,

    • "National Infrastructure Protection Plan", located athttps://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
    • DHS Critical Infrastructure Security Webpage, located at https://www.dhs.gov/topic/critical-infrastructure-security
    • "NIST Framework for Improving Critical Infrastructure Cybersecurity," located athttps://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf
    • "NIST Roadmap for Improving Critical Infrastructure Cybersecurity," located athttps://www.nist.gov/cyberframework/upload/roadmap-021214.pdf 

Write a three to five (3-5) page paper in which you:

1. Interpret the Department of Homeland Security's mission, operations and responsibilities.

2. Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets.

3. Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

4. Describe the vulnerabilities that should concern IS professionals who protect the U.S.'s critical infrastructure.

5. Suggest three (3) methods to improve the protection of the U.S.'s critical infrastructure, and justify each suggested method.

6. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.'s critical infrastructure, and indicate the strategic ways that you believe IS professionals could better serve as protectors.

7. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

Reference no: EM13806966

Questions Cloud

Ethics and social responsibility : Select a small business with which you are familiar and develop a plan of action for encouraging ethical behavior. Provide specific examples to support your response.
Community efforts and managing public relations : According to this week's reading and the e-Activity, businesses enhance their reputation and build trust when they address community needs in a positive way.
Safety program mangment : safety program mangment
What technologies you believe provide the biggest challenge : Assess the challenges e-Business and e-Commerce technologies present to the field of Information Technology. Describe what technologies you believe provide the biggest challenge and provide a strategy to overcome that technological challenge. Supp..
Critical infrastructure protection : Critical Infrastructure ProtectionAccording to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.
Please discuss bruce tuckman and kurt lwein : Leaders must frequently address competing needs of work groups. Conflict can arise when groups vie for limited resources. Addressing the conflict is essential to leading.
Behavioural health : Behavioural health
Create your ethical organization profile : Explain the current moral and ethical issues faced by your virtual organization.
Define how the project tasks will be tracked : Discuss any float built into the project, and justify your reasoning. Define how the project tasks will be tracked and how completion of tasks will be verified

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss recent legislation related to ethical computing.

Discuss recent legislation related to ethical computing.

  Use functions to get a list of integers from a user

Use functions to get a list of integers from a user and then find statistics of the given list of integers. You are not allowed to use any built in functions for finding the calculations in this assignment.

  Describe one real or future (even imaginary) iot

Describe one real or future (even imaginary) IoT (or CPS - Cyber Physical System) usecase. Provide details on the system(s) requirements from user(s)/actor(s) perspective.

  Display an appropriate message comparing the month expenses

Display an appropriate message comparing the month's expenses to the budget.

  Consider an online reservation system for a restaurants

consider an online reservation system for a restaurants patrons. analyze the type of vulnerabilities and threats that

  Type of change process

General Electric established its Work-Out process in the early 1990s. It continues to be a mainstay in GE's efforts to initiate change. In the interim years, the Work-Out process has also been adopted by such diverse organizations as General Motor..

  Riordan manufacturing

A full description of the new system, a description of its components, and the benefit it will provide to Riordan Manufacturing (Virtual Organization)

  How procuring organization has sorted out problem

You are the engineer involved in development of financial system. Should you simply abandon work until procuring organization has sorted out problem?

  Video centers of europe ltd. data warehouse

Video Centers of Europe, Ltd. data warehouse

  Cisco reseller and one of your smb customer

You work for a Cisco reseller and one of your SMB customer is having a network problem. A VLAN was configured by company's only system/network admin on the new server subnet. Customer can't access the resources on the new subnet

  Compute net present value and return on investment

Compute net present value (NPV) and return on investment (ROI) and present break-even analysis (BEA). Suppose discount rate of 12 percent and five-year time horizon.

  The menu structure for holiday travel vehicle"s existing

The menu structure for Holiday Travel Vehicle's existing character-based system is shown here. Develop and prototype a new interface design for the system's functions, using a graphical user interface.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd