FROM: Information Systems Security Director DATE: Monday, April 23, 2018. SUBJECT: NATIONAL INFRASTRUCTURE PROTECTION PLAN It has come to the attention of the Chief Information Officer and other stakeholders of this company that there is a need to evaluate our Infrastructure Protection Plan. As such, in my capacity as the Information Systems Security director, I have reviewed the National Infrastructure Protection Plan as provided for by the Department of Homeland Security. Regarding this company
Words: 909 - Pages: 4
The summary determines Critical Infrastructure Protection (CIP) is an important Cyber Security initiative that requires careful planning and coordination in protecting our infrastructure: 1. What is the Department of Homeland Security’s Mission, Operations, and Responsibilities? 2. What is the Critical Infrastructure Protection (CIP) initiatives are; what are protected, and the methods used to protect our assets? 3. What are the vulnerabilities IS professionals need to be concerned with when protecting
Words: 1936 - Pages: 8
Infrastructure good or bad? What is infrastructure? Infrastructure is the basic and organizational structures and facilities needed for the operation of a society or enterprise. Why am I bringing this word up? Well, for numerous centuries there has always been an argument about how much should the U.S government pay for infrastructure. In my opinion, I think infrastructure is good, because we need to help those without cars and have a safe environment. First, one important reason I think infrastructure
Words: 410 - Pages: 2
selected General Electric (GE), because I work in medical capital equipment field where I compete against GE in their Healthcare sector. GE is consistently ranked as one of the world’s leading corporations. GE provides capital, expertise and infrastructure for a global economy. GE Capital provided billions in financing, so businesses could build and grow their operations and consumers could build their financial futures. GE build appliances, lighting, power systems and other products that help millions
Words: 379 - Pages: 2
reports will consist of: - The two auditing frameworks or hardening guidelines / security checklists used by the DoD. - How a security assessment addressing modern day risks, threats, and vulnerabilities throughout the 7-domains of a typical IT infrastructure can help an organization achieve compliance. - How to gather and obtain needed information to perform a GLBA Financial Privacy & Safeguards Rules compliance audit and what must be covered. - The top workstation domain risks, threats, and vulnerabilities
Words: 2140 - Pages: 9
of the key areas of the security infrastructure be compromised it will have devastating effects on the reliability, availability, viability of operational abilities and integrity of data. As well the system vulnerabilities are more easily. Attacks are carried out on these compromised infrastructures including industrial espionage, revenge, financial gain, and terrorism. ISSA.com/security Some of the principles used in the design of a secure Infrastructure are compartmentalization of information
Words: 727 - Pages: 3
Federal Aviation Administration, This has great implications to my current job. The company that I work for is currently under contract to develop the ground stations of ADS-B infrastructure to be put in place. This proposal requires that all aircraft that fly within the National Airspace System (NAS), to have onboard at minimum an ADS-B transmitter by 2020. These changes will allow the ATC better control over congested airspace and allows for more favorable environmental conditions by reducing
Words: 398 - Pages: 2
Case Study 2: Information Security and the National Infrastructure Tamika C. McCray Professor Darrel Nerove SEC 310 – Homeland Security July 19, 2012 In reading the article, I gather that our country’s natural resources might be at very real danger due to cyber threats. I am once again surprised that there is no effective plan in place for protecting these very important resources. In any company that has something to lose, there should be appropriate security measures taken in accessing
Words: 835 - Pages: 4
Task 1 Name Tutor Institution Course Date Memorandum Re: Tech Upgrade Proposal To: Mr. Kern From: Me A. I performed a SWOT analysis on the current AEnergy technology infrastructure. A SWOT analysis is a technique and opportunity for a thoughtful overview of where things are good and where things need improvement. SWOT stands for Strengths, Weaknesses, Opportunities, and Threats. I’ve reviewed our system for all four of the SWOT attributes to give the following
Words: 4123 - Pages: 17
the Department of Homeland Security and private sector companies. She has requested an information paper that shows her why these relationships are important, as well as how the DHS uses these companies as a tool for the protection of critical infrastructure and key resources. To: Director, Executive Secretariat of the Office of the Secretary, DHS From: Action Officer, Executive Secretariat of the Office of the Secretary, DHS Ma’am, Cooperation with all levels and forms of security entities
Words: 1338 - Pages: 6