shanki replies

Can you help me understand this Computer Science question?

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
shanki replies
Post Your Own Question And Get A Custom Answer
Hire Writer

provide replies to student posts each in 150 words.

shank-Safeguarding the critical infrastructure of the nation from China is done with the advent of DHS and the main functions include the IT infrastructure, Government agencies, telephone connectivity, electric grid, and commercial establishments. Integrated Risk Management programs are planned and applied by the Director of the Office of Management Budget (OMB) as a part of providing Homeland security. These programs are used to mitigate the vulnerabilities as per Section 1 of Cybersecurity of Federal Networks as exploited by the national actors. According to the Framework for Improving Critical Infrastructure Cybersecurity as per the NIST, this plan is implemented to protect the Homeland security using the Chapter 35, Subchapter II of Title 44 of the United States Code (Young & Hall, 2015)

Risk like Botnets the automated distributed threats are mitigated by working with the agencies those head the Federal Trade Commissioners and this is the core responsibility of Director of OMB, Secretary of Homeland Security with Nation’s Critical Infrastructure as per sec 5195c(e) of title 42. Also, disruption of electricity infrastructure and building are also considered under Incident response capabilities along with the United States Cyber Incident Coordination Policy Directive. Industrial base protection is also considered under Section 2f and this will be handled by the agencies like Assistant President for Homeland Security and Counterterrorism and President of the National Security Affairs (Herrera & Maennel, 2019)

IT security aspects like theft, fraud, internet security, innovation, privacy protection, and reliability are considered as per section 3 of Cybersecurity. Following are some of the additional considerations taken

• Subsection b for deterrence and protection speaks about the possible options to protect from adversaries and thus protect the people from threats

• Subsection c speaks about the importance of International Cooperation and Workforce Development to achieve Cybersecurity using the cyber peers’ concept

• Section 4 of Information Technology (IT) in the section 11101(6) the title 40, United States Code discusses the procedures to monitor and control the software and hardware systems via the agencies and thus control physical equipment (Theoharidou, Xidara & Gritzalis, 2008)

sat-The Department of Homeland Security (DHS) plays an important role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure assets and the Department of Defense and Federal agencies. Secretary Johnson has confirmed that DHS also takes a role and has taken it seriously in what is a fast-moving technical field. The measures to be implemented by DHS relate to cybersecurity vulnerabilities and controls within a significant portion of critical infrastructure sectors. These initiatives do not violate existing laws, regulations or administrative guidance. Instead, they require the use of current investigative, technical, and administrative authorities to detect, prevent, and respond to the adverse effects that may result from identified cybersecurity risks. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. The Department of Homeland Security (DHS) plays a role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. (Kappeler, V. E. (2019))

The Department of Defense issued an interim directive that addresses the DHS Directive and explains the needs of the DHS, DOD, and the US industrial base to work together to identify specific, tailor-made cybersecurity projects to achieve risk and opportunity for collaboration. DHS measure increases the frequency and scope of cyber monitoring and reporting. DHS encourages and cooperates with U.S. Government and industry partners. DHS also worked with the Department of Defense (DOD) to coordinate the response to the recent ransomware attacks, an attack that impacted multiple systems and affected millions of customer information. A critical infrastructure is a group of activities, facilities, services, and assets that are essential to the nation’s security and that, as such, are protected from unauthorized access or use. While critical infrastructure cannot be entirely protected from cyber-attacks. (Sylves, R. T. (2019))

nag-Cyber-attacks increase every day due to the prevailing freedom of the cyber landscape. Today everyone can easily access internets everywhere. In contrast, hackers have established new methods of cyber-attacks such as social engineering techniques to manipulate people. Therefore, although various governments have enforced strict measures to reduce cybercrimes, the attacks seem endless. The organized cyber-attack by China is an issue of concern that appear to cause a dilemma to the department of Homeland Security. For decades, the primary purpose of Homeland security has focused on working tirelessly to ensure the wellbeing of US citizens is at stake. Nonetheless, although the issue causes a dilemma, DHS can formulate various strategies to handle the situation.

It is paramount for Homeland security to first asses the cybersecurity attack. The risk associated with cyber-attack keeps evolving. Homeland Security should work closely with specific agencies such as General Services Administration, Department of Defense and all cybersecurity firms to evaluate the attack and mitigate it (Bowerman, 2017). DHS should put extra efforts to communicate with these agencies through other back up techniques to ensure there is smooth coordination between them.

While assessing the attack with the help of other agencies identifies the intensity of the attack, Homeland Security should protect the information of the federal government systems. Protecting information reduces the overall vulnerability that the attackers may use to cause further damage (Lavanya, 2018). In the efforts to safeguard the crucial federal information, DHS should also triage the risks the government may face as a result of the attack.

DHS also should educate all stakeholders concerning all the latest cyber-attacks to prevent such as the scenario in future. The education should involve the use of unsecured websites and reckless sharing of confidential data to other parties. DHS can as well establish more backups of data to encrypt information with ransomware.

superadmin (28431)
New York University

Hire an Expert to Help you

Hire Verified Expert

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Have a homework question? Get help from verified tutors now!

Are You Looking For Assignment Help? We Can Certainly Assist You