Define how does a cikr vulnerability assessment

Assignment Help Computer Engineering
Reference no: EM131722776

Question 1. How does a CIKR vulnerability assessment differ from a risk assessment?

Answers may vary, but vulnerability indicates there is a weakness that needs to be protected, and could be well-protected, whereas risk indicates that a certain action will be taken despite the risk which is being measured.

Question 2. Identify the 3 critical infrastructure sectors with which you are most likely to interact in a typical day. Choose 3 with which you are least likely to interact. Explain why you considered them to be critical in the selection process.

Question 3. Research what would be considered critical infrastructure and key resources in a country of your choice (other than the U.S.). Based on a variety of criteria you determine (such as the political, economic, and military posture of the country), choose several areas that should be considered critical infrastructure and several that should be considered key resources. Identify how you would suggest your choices should be defended in a memo to the new president or leader of that country.

Reference no: EM131722776

Questions Cloud

Classmates about strategies for remembering : She wants to talk with some of her classmates about strategies for remembering all the details and applying the required steps.
What could be done to minimize their impact on the system : Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system
Which is the most challenging : What are some strategies that you can use to ensure that you are completing all the required steps in the correct order when assigning the correct code?
How did the given boom affect coloradoans and the state : describe in at least 300 words the changes to Colorado's economy in the late 20th century. How did this boom affect Coloradoans and the state?
Define how does a cikr vulnerability assessment : How does a CIKR vulnerability assessment differ from a risk assessment
What punctuation should go in the underlined space : What punctuation should go in the underlined space? 1. My mom wants to move to Arkansas _ I want to stay here.
What process did they take to make the journey : What process did they take to make the journey? What do you consider to be your culture? When did you first become aware of your culture?
Determine the temperature of molten iron : Temperature of molten iron. The Cleveland Casting Plant produces iron automotive castings for Ford Motor Company.
Anti cyber squatting consumer protection act : What does the Anticybersquatting Consumer Protection Act do. How does this act cut down on nuisance suits

Reviews

Write a Review

Computer Engineering Questions & Answers

  How polymorphism might be used in a system you are familiar

Discuss a real-world example of how polymorphism might be used in system you are familiar with. Explain different techniques for identifying candidate solution.

  Create preventative controls for sungrafix

Create Preventative Controls for SunGrafix, video game design company. In some cases, outage impacts identified in BIA may be mitigated or eliminated through preventive measures that deter and/or reduce impacts to  system.

  Virtual circuit is newly set up in an atm network

ATM networks use a token bucket scheme to regulate traffic (traffic shaping). A new token is put into the bucket every 1 usec so ATM cells can be sent during this time. The data payload of ATM cells is 48 bytes.

  Describe sharepoint services and various sharepoint options

discuss sharepoint services and various sharepoint options as well as windows media rights management to handle the

  Possibility of writing a program

Discuss the possibility of writing a program that takes another program as input and determines if that program contains a virus.

  Discuss what is the method

Write a method called drawCircle that draws a circle based on the method's parameters: a Graphics object through which to draw the circle, two integer values.

  Discuss the distribution of the complex gaussian process

Circular symmetry criterion for a complex Gaussian process. Show that the distribution of the complex Gaussian process Z(t)ei? is invariant for all rotations.

  Prepare a script that would accumulate your user name

The first part of your assignment is to prepare a script that would accumulate your user name, date and time, your computer information and a command running into a log that would be mailed to your instructor.

  Discuss the mass flow rate

In film cooling the primary effect is believed to be due to the energy put into or taken out of the boundary layer, rather than the mass of fluid injected.

  Creating a program with a building as subclass

Assume the existence of the Building class. Describe a subclass, ApartmentBuilding that consists of following instance variables: an integer, a boolean, numFloors, an integer, hasElevator, unitsPerFloor, a boolean, hasCentralAir, and a string, man..

  Software reliability is very important to the success

Software reliability is very important to the success of our software engineering efforts. define the effect of maintenance activities on software reliability and how to ensure continued software reliability.

  Explain computer programming is art or science

Which programming language appeals to you, and which language do you consider least appealing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd