Reference no: EM132294013
Cyber Security Control
This assignment and discussion will be concerning the Controls that can prevent, stop, or fix (hopefully), relative to an attack on a cyber system. Of interest to the HSEM student a central focus may be homeland security issues.
However, cyber security is of great importance to all the systems in the Department of Homeland Security. A cyber attach could occur in Customs and Boarder Patrol, FEMA, Immigration, or any of the other elements that make up the department.
The concepts for study should focus on an area of DHS that interests you and the actual and/or potential for cybersecurity attacks. Usually when cybersecurity is mentioned in the HSEM field, terrorism is the first thing that comes to mind. This is an area you can explore, or you may choose any other DHS area.
For your assignment and discussion:
For your paper, research this topic (what are the various types of cyber threats and which are the most successful) and write a 3-4-page paper on 1) how you conducted your research, 2) what you found during the research, and 3) what conclusions you can draw from the information you gathered.
Be sure to include your references for this paper. For your discussion on the topic of cyber security controls should include the success, frustrations, and any surprises you have had in finding information on this assignments topic.
Analysis of a current event having to do with american
: Write a current event paper consisting of a summary and analysis of a current event having to do with American government and/or politics.
|
Identify your personal code of ethics
: Identify your personal ethics, values, morals, and beliefs in a 1000 word essay. Locate and read a code of ethics which is related to your major interest.
|
Source coding implementation using matlab
: Source Coding Implementation Using MATLAB/Simulink - Apply and evaluate the principles used in the generation, transmission and reception of digitally modulated
|
The concept of strategic planning environmental scanning
: The concept of Strategic Planning environmental scanning is, by far, one of the most critical factors.
|
What are the various types of cyber threats
: What are the various types of cyber threats and which are the most successful.
|
What is a spreadsheet
: What is a spreadsheet. How do we use spreadsheets as data storage and data analysis tools? How do you use spreadsheets to manage daily administrative tasks.
|
Invest that computes and return the total interest
: Using Java, compile a method named invest that computes and return the total interest earned on a financial investment.
|
How do you see the agencies can work better together
: How do the agencies work together or contrast each other, how do you see the agencies can work better together in relation to HSEM subjects.
|
Discuss the topic of cyber security controls
: A cyber attach could occur in Customs and Boarder Patrol, FEMA, Immigration, or any of the other elements that make up the department.
|