Reference no: EM131907029
Your presentation might address the following for the U.S. Information Technology (IT) sector and cyber space:
• What is included in the U.S. IT System?
o Does the SSP limit its actions to specific or narrowly focused elements or aspects of the IT system, such as the Internet?
o Does the SSP address potential impacts on other critical infrastructures?
• Analysis of the IT system and cyber space using the SSP template for protecting the critical infrastructure:
o Define the IT sector and cyber space vulnerabilities.
o Specify protective measures to address these threats.
o Discuss risk management considerations (threats vs. vulnerabilities).
o Identify dependencies with other agencies, departments, and other organizations.
o Identify shortfalls in the current system.
• Are there lessons to be learned from any major hacking or cyber attack incidents that could drive changes to the SSP?
• Does the SSP need better linkages to the other SSPs?
• How does the IT SSP relate to President Obama's Executive Order and PPD-21 of 2013, or President Trump's Executive Order of 2017?
• Provide specific recommendations to the President for actions to improve the security posture of the U.S. in the context of this sector.
• Recommend any changes or elements that should be included in the updated version of the SSP for the IT sector.
Bottom line: This is your opportunity in about 20 slides/viewgraphs to inform the President on how to improve the security and protection of the U.S. IT sector and cyber space.
The successful project will advise the President on how to improve the IT/cyber security using the SSP as a framework for defining the solutions.
FORMAT
Each team will prepare a short PowerPoint (or Prezi or Google Docs) presentation (approximately 20 slides) along with any relevant notes - either as notes on the slides or as a separate Word document.
Attachment:- Govt. Project Problem.rar
Cretae a diagram that shows the encryption and decryption
: The pump abating cipher block chaining (PCBC) mode is a variation of CRC in which both the previous. Draw a diagram that shows the encryption and decryption.
|
What are the requirements of a valid search warrant
: Assume you are talking on your cell phone with your parents while standing in the hallway of a university building between classes.
|
What are the conclusions of hypothesis
: What are the conclusions of each hypothesis. The underlying population standard deviation is known to be 3.5 and the population distribution is normal:
|
Draw a diagram that shows the encryption and decryption
: The block chaining (BC) mode is a variation of CBC in which all the previous cipher text blocks. Draw a diagram that shows the encryption and decryption.
|
Define the it sector and cyber space vulnerabilities
: Does the SSP limit its actions to specific or narrowly focused elements or aspects of the IT system, such as the Internet?
|
Has John committed a murder
: John and Tyrone have a fight in a bar. Tyrone returns home, climbs into bed, and suffers a fatal heart attack. John, still angry from the earlier fight.
|
Show effect of error propagation when ecb uses cts technique
: Show the effect of error propagation when ECB uses the CTS technique. Show the effect of error propagation when CBC uses the CTS technique.
|
Normalized levels of a critical protein
: The following are the normalized levels of a critical protein in 12 samples of blood: 8.2, 4.7, 10.3, 11.7, 18.3, 5.9, 3.8, 18.9, 7.6, 14.2, 9.8, 16.4
|
Show the encryption and the decryption diagram for crc mode
: Show the encryption and the decryption diagram for CRC mode (only the last two blocks) when cipher text stealing (CTS) is used.
|