Need for a national framework for protecting critical infrastructure. Overview of https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/. Please explain how DHS should handle the below situation from the above link & need for a national framework for protecting critical infrastructure. The United States will be hit by a large-scale, coordinated cyber-attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited, and satellite communications are down (limiting the Department of Defenses [DODs] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit.
Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet the deadline. RESPONSE 1: Which one of the following statements is most correct about data encryption as a method of protecting data? For this weeks forum we had to review or examine statements that were provided to us. To answer the above question, I chose to discuss is number 4: it requires key management. Key management refers to the process of managing cryptographic keys for a system. The management involves the creation, exchanges, and protection of these keys. Key management is also involved in monitoring and accesses made by individuals in the system. Encrypted messages can be read by authorized users, but not by those who do not have permission. One good way to practice good key management practices is to physically make sure hardware and all systems being used are store properly, and securely from anyone who can easily access them physically. Another great practice to make sure that all of the systems is up to date. It is also important to have a key life cycle, as we learned in our labs for last week. To also make sure that they are properly stored somewhere other than the systems in which they are used in to make sure that there is a back up if something bad were to happen. Performing audits can prevent from cryptic keys to get hacked or stolen. Audits can also ensure. RESPONSE 2: I hope everyone is having a good week so far. This week we are talking about public key infrastructure and data encryption as a method of protecting data. Out of the options we were given I would say that careful key management is the most correct. We as humans lose things all the time. I know I always misplace my phone and the tv controller. When looking at key management there are 3 different types of protocols with the main goal being centralized. You want the key to be able to move through the department. To implement centralized protocols you need the proper equipment, policies in place to handle the keys and processes to implement the activities.”Centralized key management enables proper key governance, even when data and people move from department to department throughout an organization” (Kazarian, 2019). “If your key server capabilities don’t mesh well with the key governance requirements, implementing centralized key management becomes very difficult” (Kazarian, 2019).Resources: Kazarian, J. (2019, January 22). An essential guide to encryption key management in the enterprise. Retrieved June 30, 2020, from https://techbeacon.com/security/centralized-encryption-key-management-why-you-need-it-how-deploy-it
Imagine that you work for an organization that has no Internet use policy; employees use the Internet in whatever way they want using company-owned personal computers (PCs). Could this cause a problem for the organization? Explain the importance of information security policies and the role they play in ensuring sound and secure business information. Discuss the following IT security policies and the level of protection each policy provides in the context of the scenario: Internet use policy, External device use policy, Employee identity (ID) policy, Computer use policy. How would each policy help the situation described in the scenario? How might each policy hinder the situation described in your assigned scenario? Include your rationale for whether each policy helps or hinders the situation in your assigned scenario.
Summary: The assignment requires you to carry out some systems analysis and early systems design activities for the case studies described in attached file. Emphasis is less on essay writing, and more towards diagrams and lists (with brief descriptions). Deliverable: 1 Word document -> containing (No. / Deliverable / Marks): >> 1 Stakeholders 5 >> 2a Functional requirements 5 >> 2b Non-functional requirements 5 >> 3a List of use cases from user goal technique 10 >> 3b List of use cases from event decomposition technique 10 >> 4 Domain model class diagram 20 >> 5 CRUD matrix 10 >> 6 Fully-developed use case description 10 >> 7 Activity diagram 10 >> 8 System Sequence Diagram (SSD) 10 >> 9 State Machine Diagram (SMD) 10 >> 10 User acceptance test plan 20 >> 11 Presentation including layout, formatting, table of contents, and proofreading Due Date: 5 days from now (21 July 2020). Skills suited for this assignment: > Understanding diagrams (such as CRUD matrix, domain model class diagram, use case description, activity diagram). Reference materials (lecture powerpoint slides) for diagrams included. > Understanding use cases, functional requirements and stakeholders for IT systems design Note: A report (or some kind of proof) that the work produced is not flagged as plagiarized work. Thank you!!
I need a 5 page research paper on the early manned space programs. Here are 5 questions this paper should address; What were some of the original criteria needed to become an astronaut? What brought about the decision to go to the moon? What were the requirements for the space facilities location? What went into the design of the rocket, support systems and how they came up with the ideas to succeed in this endeavor? And finally, what were some of the benefits of the space program, overall. I have started the paper and will include what I have so far in the file upload section. There is a citation at the bottom of a book I have here at the house which can be used as a works cited.
You have been asked to make an “emerging technologies” presentation as part of a panel discussion at your company’s next senior leadership meeting. The topic for this panel is Cybersecurity for the Internet of Things. The panel moderator, your company’s Chief Technology Officer, has asked the speakers to each focus on one of four categories of enabling technologies for the Internet of Things (International Telecommunications Union, 2005): Tagging things: RFID and similar technologies Feeling things: Sensor technologies Thinking things: Smart technologies Shrinking things: Nanotechnology Pick one of these categories. Research technologies which fit into your category (in the context of the Internet of things). Then present a summary of your research and findings as a background paper to be shared with the moderator and other panelists prior to the meeting. At a minimum, your background paper must address the following questions. 1. What is your selected category? (Name and describe it.) 2. What are the leading technologies in your selected category? (Name and describe at least three.) 3. How do these technologies contribute to the Internet of Things? (What are the benefits / what features or capabilities do they provide?) 4. What emerging risks to privacy and security have been identified for technologies in your selected category? Format your analysis and findings as a background paper. Cite your sources (3 minimum) and include a reference list.
Describes, explains and justifies the purpose and organization of chapter 3 including the linkage to key topics in the scholarly research.Assesses the value of the research design and methodology and justifies it with several scholarly research sources. Aligns the research design to the research questions.Explains, defends, and rationalizes the selection criteria for participants, saturation, recruitment (participation) procedures, and any inclusion or exclusion criteria. Integrates recent and relevant scholarly justification for all elements of the research design.Explains and defends the setting and context of the research and, if applicable, fully describes the process of identifying, interviewing and selecting a sponsoring organization. Provides a compelling reason for selecting the organization (if appropriate) by detailing reasons for why the research will benefit both the practitioner and scholar.Constructs a set of criteria to create and subsequently judge the questions of inquiry from concept to statement development, including scholarly support and alignment for all concepts and questions. Provides an in-depth description of the interview protocol. Explains, clarifies, and aligns the coding structure. Explains the unique role of interviewer as instrument. addressing credibility and accuracy concerns.Constructs a detailed description of the process of assessing, comparing, and justifying the dependability and credibility of the data collection construct. Explains dependability and credibility (including any triangulation techniques) as it relates to future use.Analyzes and evaluates how the data is recorded; the data capture method (conversations, facial features, body language); Explains and clarifies the establishment of coding structure in alignment with the conceptual framework; details remediation procedures; and expected time with participants. Justifies their response, to these items, with specific scholarly sources.Evaluates scholarly support and viable alternatives for data analysis, data displays and software (version identified) applications. Selects the best technique based on the needs of the research and research questions; available data, and scholarly author’s recommendations. Explains how the data will be summarized and presented (types of graphs and charts planned). Selects appropriate techniques based on researchthe questions and the expected outcome.Explains, in detail, privacy, confidentiality and data security concerns; compares and contrasts with like scholarly research; addresses risk in comparison to benefits; avoids vulnerable populations. Explains the ethical conduct of research referring to IRB requirements and the findings from the Belmont Report.Assembles an extensive and comprehensive list of all cited references including peer reviewed journal articles.