Explore the roles and responsibilities of the dod and dhs

Assignment Help Management Information Sys
Reference no: EM131812535

Assignment

Instructions

For this assignment, you represent a defense contractor who has been asked by the Department of Defense (DoD) and the Department of Homeland Security (DHS) to participate in their cybersecurity initiatives. Although DHS and DoD would permit you to participate in the other programs, you have only enough resources to participate in one. Your supervisor has asked you to write a memo highlighting the benefits and obstacles of working with each. Which organization might provide you with the information that your company needs to manage cyber threats? Which department can better manage civil liberty concerns? Is the DoD or the DHS the appropriate organization with which your company should partner?

You will explore the roles and responsibilities of the DoD and DHS in cybersecurity. Express your initial view as to which department has the legal authorities to lead cybersecurity efforts. Does the DoD have the authority to lead the national cybersecurity effort, or does the DHS?

Reference no: EM131812535

Questions Cloud

Accrue the estimated warranty cost : Prepare the adjusting entry at December 31 to accrue the estimated warranty cost.
How many hours of television viewing must a household have : Television viewing reached a new high when the Nielsen Company reported a mean daily viewing time of 8.35 hours per household (USA Today, November 11, 2009).
Examine the case and propose why the changes occurred : Discuss how the treatment plan needs to be adjusted to address the changes in the situation.
Discuss the communication issue provided in the scenario : ENG315 Address the communication issue from the scenario and Request a face-to-face meeting to discuss the issue (at a specific time)
Explore the roles and responsibilities of the dod and dhs : explore the roles and responsibilities of the DoD and DHS in cybersecurity. Express your initial view as to which department has the legal authorities to lead.
Discuss a directors breach of common law duties : What are the company's civil remedies for a director's breach of common law duties
Prepare the adjusting journal entry : Prepare the adjusting journal entry that should be prepared to reflect the reconciling items.
What is expected number of regions with major forest fires : Three areas of southern California are prime candidates for forest fires each dry season. You believe (based on historical evidence) that each of these areas.
Prepare the amortization table : Bradley-Link issued a 10.6%, $100 million bond on 7/1/2009 at 110. Interest is paid semiannually on June 30 and December 31. Each $1,000 bond

Reviews

Write a Review

Management Information Sys Questions & Answers

  The theory of constraints and the supply chainin 1000 words

the theory of constraints and the supply chainin 1000 words explain how the theory of constraints applies to a supply

  How do cloud threats differ from traditional threats

How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? You are opening an online store in a cloud environment. What are three security controls you might use to prot..

  Are some types of devices better suited to dhcp than others

Provide a brief description for each DHCP message that would be exchanged, in order, if the DHCP server is in the middle of rebooting during an initial lease request but comes up seconds later. Answers might be slightly different depending on whe..

  Explore and identify key literature elements

Evaluate the Newman, Thanacoody, and Rani Article linked in this discussion and in this unit's Studies, in which you explore and identify key literature elements.

  What is the relationship between quantum and incremental

what is the relationship between quantum and incremental technological change and why are these types of change

  Describe the step used to log into the strayer oracle server

Use the print screen option on a keyboard or a snipping tool to capture screen shots of your telnet session into the Oracle server. Note: The graphically depicted solution is included in the required page length.Briefly describe the steps used to ..

  What is a marketing information system

What is a marketing information system (MIS)?- What types of information are included in a marketing information system?

  Show intranets and extranets impact

Discuss intranets and extranets impact on organizations and how it has changed the way employees receive training, communicate, conduct transactions, or access information in the workplace.

  Describe the trade-off between the two technologies

Cite two examples of a circuit switch and packet switch environment. Base one example on a circuit switch and the other on a packet switch. Describe the trade-off between the two technologies and the reason why packet switching is more appropriate..

  How will companies like aol survive

Dail-up Technology and Is dial-up a dying technology? If so, how will companies like AOL survive?

  International transfer of knowledge and technology

International transfer of knowledge and technology - why is technology tranferred within a mnc and what are the advantages/disadvantages of intra firm technology transfer

  Why it is important for business survival

Does business need IT?Why IT is important for business survival?What is required to apply IT into business? How does business use IT? (internally such as staff, employees, and externally such as customers, suppliers)hat benefits and advantages does I..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd