Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

shanki replies

Question Description

provide replies to student posts each in 150 words.

shank-Safeguarding the critical infrastructure of the nation from China is done with the advent of DHS and the main functions include the IT infrastructure, Government agencies, telephone connectivity, electric grid, and commercial establishments. Integrated Risk Management programs are planned and applied by the Director of the Office of Management Budget (OMB) as a part of providing Homeland security. These programs are used to mitigate the vulnerabilities as per Section 1 of Cybersecurity of Federal Networks as exploited by the national actors. According to the Framework for Improving Critical Infrastructure Cybersecurity as per the NIST, this plan is implemented to protect the Homeland security using the Chapter 35, Subchapter II of Title 44 of the United States Code (Young & Hall, 2015)

Risk like Botnets the automated distributed threats are mitigated by working with the agencies those head the Federal Trade Commissioners and this is the core responsibility of Director of OMB, Secretary of Homeland Security with Nation’s Critical Infrastructure as per sec 5195c(e) of title 42. Also, disruption of electricity infrastructure and building are also considered under Incident response capabilities along with the United States Cyber Incident Coordination Policy Directive. Industrial base protection is also considered under Section 2f and this will be handled by the agencies like Assistant President for Homeland Security and Counterterrorism and President of the National Security Affairs (Herrera & Maennel, 2019)

IT security aspects like theft, fraud, internet security, innovation, privacy protection, and reliability are considered as per section 3 of Cybersecurity. Following are some of the additional considerations taken

• Subsection b for deterrence and protection speaks about the possible options to protect from adversaries and thus protect the people from threats

• Subsection c speaks about the importance of International Cooperation and Workforce Development to achieve Cybersecurity using the cyber peers’ concept

• Section 4 of Information Technology (IT) in the section 11101(6) the title 40, United States Code discusses the procedures to monitor and control the software and hardware systems via the agencies and thus control physical equipment (Theoharidou, Xidara & Gritzalis, 2008)

sat-The Department of Homeland Security (DHS) plays an important role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure assets and the Department of Defense and Federal agencies. Secretary Johnson has confirmed that DHS also takes a role and has taken it seriously in what is a fast-moving technical field. The measures to be implemented by DHS relate to cybersecurity vulnerabilities and controls within a significant portion of critical infrastructure sectors. These initiatives do not violate existing laws, regulations or administrative guidance. Instead, they require the use of current investigative, technical, and administrative authorities to detect, prevent, and respond to the adverse effects that may result from identified cybersecurity risks. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. The Department of Homeland Security (DHS) plays a role in the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure. DHS in this circumstance has a responsibility as part of its responsibilities under the Secretaries Order and its regulations. (Kappeler, V. E. (2019))

The Department of Defense issued an interim directive that addresses the DHS Directive and explains the needs of the DHS, DOD, and the US industrial base to work together to identify specific, tailor-made cybersecurity projects to achieve risk and opportunity for collaboration. DHS measure increases the frequency and scope of cyber monitoring and reporting. DHS encourages and cooperates with U.S. Government and industry partners. DHS also worked with the Department of Defense (DOD) to coordinate the response to the recent ransomware attacks, an attack that impacted multiple systems and affected millions of customer information. A critical infrastructure is a group of activities, facilities, services, and assets that are essential to the nation’s security and that, as such, are protected from unauthorized access or use. While critical infrastructure cannot be entirely protected from cyber-attacks. (Sylves, R. T. (2019))

nag-Cyber-attacks increase every day due to the prevailing freedom of the cyber landscape. Today everyone can easily access internets everywhere. In contrast, hackers have established new methods of cyber-attacks such as social engineering techniques to manipulate people. Therefore, although various governments have enforced strict measures to reduce cybercrimes, the attacks seem endless. The organized cyber-attack by China is an issue of concern that appear to cause a dilemma to the department of Homeland Security. For decades, the primary purpose of Homeland security has focused on working tirelessly to ensure the wellbeing of US citizens is at stake. Nonetheless, although the issue causes a dilemma, DHS can formulate various strategies to handle the situation.

It is paramount for Homeland security to first asses the cybersecurity attack. The risk associated with cyber-attack keeps evolving. Homeland Security should work closely with specific agencies such as General Services Administration, Department of Defense and all cybersecurity firms to evaluate the attack and mitigate it (Bowerman, 2017). DHS should put extra efforts to communicate with these agencies through other back up techniques to ensure there is smooth coordination between them.

While assessing the attack with the help of other agencies identifies the intensity of the attack, Homeland Security should protect the information of the federal government systems. Protecting information reduces the overall vulnerability that the attackers may use to cause further damage (Lavanya, 2018). In the efforts to safeguard the crucial federal information, DHS should also triage the risks the government may face as a result of the attack.

DHS also should educate all stakeholders concerning all the latest cyber-attacks to prevent such as the scenario in future. The education should involve the use of unsecured websites and reckless sharing of confidential data to other parties. DHS can as well establish more backups of data to encrypt information with ransomware.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20