Subject: Emerging Threats & Countermeas
Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:
After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.
Letâ€s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defenseâ€s [DODâ€s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.
You must do the following:
1) As indicated above, please explain how DHS should handle the situation described in the preceding paragraph. (Around 500 to 600 words) need to submit by Wednesday(in next 48 hours)
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. (need to submit by anytime between thursday to saturday)
To guide your discussions, please consider the following questions:
What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?
Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
Watch the 2 videos below as part of the Lecture. – https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5629922?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25201%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190903T002626Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190903%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=04d2784d0c01ced14e43bef24edf4b085a2b01d440d49d269de9df8930d86b29
What is a Botnet Attack? https://study.com/academy/lesson/what-is-a-botnet-attack-definition-examples.html
Affects of Cyber Attacks on critical Infrastructure: https://www.youtube.com/watch?v=FmnLa3F5Piw
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
The post discussion and responses 2 etc appeared first on The Nursing Hub.