Reference no: EM131198770
Assignment : Critical Infrastructure Protection
According to the text, Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.
You may use the following resources in order to complete the assignment,
"National Infrastructure Protection Plan", located at https://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
DHS Critical Infrastructure Security Webpage, located at https://www.dhs.gov/topic/critical-infrastructure-security
"NIST Framework for Improving Critical Infrastructure Cybersecurity," located at https://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf
"NIST Roadmap for Improving Critical Infrastructure Cybersecurity," located at https://www.nist.gov/cyberframework/upload/roadmap-021214.pdf
Write a three to five (3-5) page paper in which you:
Interpret the Department of Homeland Security's mission, operations and responsibilities.
Detail the Critical Infrastructure Protection (CIP) initiatives, what they protect, and the methods we use to protect our assets.
Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving
Critical Infrastructure Cybersecurity. Justify your response.
Describe the vulnerabilities that should concern IS professionals who protect the U.S.'s critical infrastructure.
Suggest three (3) methods to improve the protection of the U.S.'s critical infrastructure, and justify each suggested method.
Evaluate the effectiveness of IS professionals in regard to protecting the U.S.'s critical infrastructure, and indicate the strategic ways that you believe IS professionals could better serve as protectors.
Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.
Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved.
Compare and contrast business continuity and disaster recovery planning.
Use technology and information resources to research issues in security management.
Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.
Compute accounts receivable turnover
: Based on the information contained in these financial statements, compute the following 2011 values for each company.- Accounts receivable turnover. - Average collection period for accounts receivable.
|
Transformational theory leader-member theory
: How would you apply the transformational theory leader-member theory (LMX) to improve an organization's performance? Discuss in the context of your own organization, an organization you have belonged to in the past, or another existing organizatio..
|
What is the risk incidence of cardiovascular disease
: Diabetes: Calculation Risk, Rate based on the given database. What is the risk (Incidence) of cardiovascular disease after 50 weeks intervention in both intervention and control group?
|
Did this complicate the investigation in any way
: Danny Rolling is described as a disorganized serial killer. Did this complicate the investigation in any way? If so, how? If not, why not? Did the fact of being disorganized have any noticeable impact on the community? If so. how?
|
Evaluate potential situations of business interruption
: Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved.
|
Transformational theory leader-member theory
: How would you apply the transformational theory leader-member theory (LMX) to improve an organization's performance? Discuss in the context of your own organization, an organization you have belonged to in the past, or another existing organizatio..
|
What would be the new breakeven point
: How many pitchers of each type must be sold to break even in 2011?- What would be the new breakeven point if managers switched to the new supplier?
|
Explore the need for waterfall and agile methodologies
: Analyze the need for waterfall and agile methodologies. Explain the advantages of extreme programming (XP) and analyze the advantages of its application in high-budget short-time projects.
|
What is the average value of rate of change of temperature
: If the thermocouple is mounted in a chemical reactor and the voltage is observed to go from 10.0mV to 13.6mV in 20s, what is the average value of the rate of change of temperature dT/dt, during the measurement period?
|