Special offer for new customers: 5% OFF your first order! Use coupon: GWRITERSclose

CSSS 5120 Mid-Term Essay Questions

Instructions

You will be presented with a series of essay questions to be answered in your own words. You may use any legitimate resource from the web, textbook, lecture, etc., but use your own analytical thought process to ensure evidence of understanding of the material. Your response to each question must be at least two pages in length.

You must respond using APA format. There is no requirement for an abstract, table of contents, etc., but remember to properly cite all sources. Use appropriate formatting with standard fonts and font size.

Questions

1.    From our review of Water Systems in week three, outline the activities taken by the EPA to monitor our water supply through its implementation of an anomaly detection system, the cybersecurity vulnerabilities within this CI, the policies, politics, and other elements that either support or hinder successfully securing our national water systems, and your overall perspective of the technical and operational challenges going forward.

(See attachment #1 – Anomaly Detection In Water Management System)

2.    Outline the specifics of Clarke’s “Defensive Triad” concept to protect CI.  Include an assessment of each of his three legs of the triad, and your perspective of the effectiveness, flaws, challenges, and potential success of implementing a cybersecurity policy that adheres to his Defensive Triad concept.

NOTES: See attachment #2 – Clarke’s “Defensive Triad” (Need to print and upload)

First is the backbone. Pg. 160, The second prong of the defensive triad is a secure power grid. Pg. 167, The third prong of the Defensive Triad is Defense itself, as in the Department of Defense. Pg. 170)

3.    Discuss the elements impacting Cybersecurity infrastructure, then identify explain the three elements you believe they should be in the top-tier from a priority perspective (impact on the nation, cost, etc.), and outline how (use specific real world and theoretical examples) those factors could impact the American people (government, individuals, companies, organizations). (To help organizations charged with providing the nation’s financial, energy, health care, and other critical systems better protect their information and physical assets from cyber-attack, the Commerce Department’s National Institute of Standards and Technology (NIST) today released a Framework for Improving Critical Infrastructure Cybersecurity.

NOTES: See attachment #3 – Framework for Improving Critical Infrastructure Cybersecurity)

“In February 2014 the Cyber Security Framework Version 1.0 was released to assist in protecting information and cyber-attacks on physical assets (Kerner, 2014). Furthermore, the NIST Framework for Improving Critical Infrastructure Security, Executive Orders (EOs) and Presidential Directives (PPDs) have aided in the fight against cyber-attacks.”

4.    Outline the Department of Defenses (DOD) and the Department of Homeland Security (DHS) responsibilities for Cybersecurity, their respective roles and relationships to fight (defense and offense) in the Cyber realm, the challenges each faces in successfully achieving their responsibilities; and, provide your perspective of what actions you believe should be taken to improve the capabilities of these two departments to enable them to meet their mission objectives.

Website: https://www.dhs.gov/news/2018/05/15/department-homeland-security-unveils-strategy-guide-cybersecurity-efforts)

You can leave a response, or trackback from your own site.
Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes