Entries by Student

write my assignment 30852

Hello I need this essay reworded to avoid plagerism

The Department of Homeland Security’s (DHS, the Department) primary assignment is to “stop terrorist assaults within the United States, decrease the exposure of the United States to terrorism, and curtail the harm, and assist in the recovery from terrorist attacks that do happen in the United States (fas.org 2015). Since being created in 2003, the Department of Homeland Security has maintained intelligence with the purpose of supporting this mission.  DHS is a member of the U.S. Intelligence Community (IC).

The Department of Homeland Security’s Operations Node retains close and constant associations with other federal and private sector partners to allow and organise an incorporated working “picture, provide operational and situational awareness, and facilitate CIKR information sharing within and across sectors”(dhs.gov, 2009). The DHS’s operational components include the U.S. Customs and Border Protection (CBP), U.S. Immigration and Customs Enforcement (ICE). U.S. Citizenship and Immigration Services (USCIS), the Transportation Security Administration (TSA), U.S. Coast Guard (USCG), and U.S. Secret Service (USSS).

Congress has made the sharing of information between departments a top priority. A responsibility of DHS as an intelligence organization, is to disseminate appropriate, information analysed by the Department within the Department, to relevant agencies of the U.S. government “with responsibilities related to homeland security, and to agencies of State and local government and private sector entities, with such responsibilities in order to assist in the deterrence, prevention, pre-emption of, or response to, terrorist attacks against the United States.”(dhs.gov, 2009).  In order to develop the way DHS manages its intelligence and data sharing responsibilities, former Secretary of Homeland Security, Michael Chertoff strengthened the Office of Intelligence and Analysis (I&A) and made the Assistant Secretary for Information Analysis the Chief Intelligence Officer (CINT) for the Department. Chertoff also gave I&A the task of ensuring that intelligence is matched, fused, and analysed inside the Department to deliver a mutual operational picture; deliver a main linkage between DHS and the Intelligence Community (IC) as well as serve as a the chief basis of data for state, local and private sector partners (dhs.gov, 2009).

Critical Infrastructure Protection (CIP) initiatives

The Secretary of Homeland Security works to develop the National Critical Infrastructure Protection Plan (CIP) to support implementation of critical infrastructure and key resources (CIKR) risk management and supporting activities and programs. This Plan delivers the attention and management mechanisms necessary to attain goals provided in the President’s Physical and Cyber Security CIKR Protection Strategies. According to the DHS those goals demand a “systematic national effort to fully harness the Nation’s research and development capabilities” (dhs.gov 2009).  CIP plan is created to tackle the main issues confronted by the numerous sector partners and to safeguard a coordinated program that yields the highest value through a wide range of interests and requirements. The plan addresses both physical and cyber CIKR protection.

According to the Department of Homeland Security the National Infrastructure Protection Plan (NIPP) provides a coordinated approach to critical infrastructure and key resource protection roles and responsibilities for federal, state, local, tribal, and private sector security partners. NIPP details how government and private sector contributors in the critical infrastructure community collaborate to handle risks and accomplish (dhs.gov, 2015).  Similarly the National Institute of Standards and Technology (NIST) resulting from an executive order was called to development of a “voluntary risk-based Cybersecurity Framework – a set of industry standards and best practices to help organizations manage cybersecurity risks” ( National Institute of Standards and Technology. 2014). The resulting Framework, was also created through partnership between government and the private sector, with the use of a simple term to address and manage cybersecurity hazard. The advancement of the NIST approach over the NIPP plan is that the NIST method employs a more cost-effective approach based on business needs without placing additional regulatory requirements on businesses.  The Framework emphases the use of business drivers to guide cybersecurity activities rather than mandates from government, as well as considering cybersecurity risks as part of the organization’s risk management processes ( National Institute of Standards and Technology. 2014).  The NIST is also committed helping organizations understand the Framework.

Vulnerabilities that should concern IS Professionals

The fear that malicious individuals could possibly shut down much of the U.S. infrastructure with the use of Cyber-attacks is an issue that should concern most IS professionals. As recently as February 2011, congress proposed a bill “for protecting both federal computer networks and critical infrastructure owned by the private sector against cyber-attacks” (Greenemeier, 2011). The vulnerabilities of such an attack would be the loss of control of the national electric grid, communication and information systems (including the internet) and water facilities, just to name a few.  One suggestion made in congress would be to remove control for elements of critical infrastructure from vulnerable access. The would simply mean removing remote control access to power stations, water pumping facilities and such other elements of critical infrastructure.  Another suggestion would be to ensure that “private companies that run critical infrastructure to comply with government demands for increased cyber security” and abide by strict government set guidelines (Greenemeier, 2011). One more option would be to allow the United States government to identify cyber threat and then intercede to protect critical infrastructure systems. This would involve giving the government a virtual “Kill switch” for Critical Infrastructure connectivity.

As it stands, Infrastructure security, may best be handled on an individual basis. A single solution for every problem may actually serve to work against security.  Persons with malicious intent would simply have to determine how to invade the prevailing security and then be able perform wide-spread attacks. However, if each component element is allowed to create its own security, while still holding to the framework guidelines set, then a relatively high level of security can be achieve. This level of security can be increased by sharing information of failed as well as successful attempt to breach infrastructural security.

 

"Not answered?"


Get the Answer

write my assignment 15988

Many companies rely on an enterprise architecture network as the focal point for business processes. Write a paper that a chief information officer (CIO) or chief

technology officer (CTO) can use with the planning phases for development, implementation, and implementation of an ERP system. The CIO or CTO indicates that the

business has strict standards in place for project governance and it is imperative at this stage of their preparation that the follow considerations are addressed:

Support various factors in the planning stages, including but not limited to the importance of planning, key personal including internal and external stakeholders,

budget, business processes, business alignment, software, applications, hardware, networks, licensing, and maintenance. In addition include other factors that

are necessary during the planning stages, and important discussion points that should occur during the planning stage.

Integrate why testing and assessment are necessary components before the implementation stage.

Categorize the implementation stage. Include a summary of the steps necessary in the implementation stage including, but not limited to migrations for existing

components, software, applications, hardware, network, security factors, testing, timelines, downtime, vendor involvement and best practices.

Break down five (5) critical factors that are important for ongoing analysis of the usage of an enterprise network architecture and recommended improvements

 

"Not answered?"


Get the Answer

write my assignment 3498

I need help answering the following questions for amazon.

* Who is the independent accounting firm that last gave an audit opinion and what was their opinion?

o What did the external auditing company have to say about your company’s internal controls within the auditing statement?

o Please go to the company’s SEC site and identify the information listed in the most recent 8-K report.

o Did you notice any differences between the company’s 10-K report and their annual report? (Look at the SEC site and the company’s website for this information.)

o Are your financial statements consolidated statements? Explain.

o Does your company issue a sustainability report or something related to it

 

"Not answered?"


Get the Answer

write my assignment 24010

 

"Not answered?"


Get the Answer