What components-proposed to increase nation cybersecurity

Assignment Help Basic Computer Science
Reference no: EM131683487

Question: Security The Office of Cyber and Infrastructure Analysis (OCIA), a division of the U.S. Department of Homeland Security, strives to thwart and respond to physical or cyberthreats and hazards. Part of the office's role is to implement two policies: (1) Presidential Policy Directive 21 - Critical Infrastructure Security and Resilience, and (2) Executive Order 13636 - Improving Critical Infrastructure Cybersecurity. These two policies are designed to strengthen and secure the country's critical physical assets and services, such as air traffic control, natural gas supplies, water treatment, power plants, and finance, which are likely targets of cyberattacks. Federal agencies must comply with and routinely assess privacy standards and civil liberties protections. The government must share information regarding the cyberthreats, such as malicious code found on networks, but not contents of personal email messages. The private companies are urged to adopt the security incentives and increase their security ­systems, but participation is voluntary.

Research This: Locate Presidential Policy Directive 21 - Critical Infrastructure Security and Resilience and Executive Order 13636 - Improving Critical Infrastructure Cybersecurity and read their contents. Then, research news articles describing lawmakers' and businesses' support and criticism of these orders. What components are proposed to increase the nation's cybersecurity? What positions do the Internet Security Alliance and The Internet Association take on this matter? What efforts has Congress made to pass legislation addressing computer security?

Reference no: EM131683487

Questions Cloud

People sometimes confuse legality and morality : People sometimes confuse legality and morality, since (1) breaking the law is not always or necessarily immoral, and (2) just because an action is legal
Standing on the sidewalk in downtown new york : Susan is standing on the sidewalk in downtown New York, waiting for the bus. Pete walks out of his office on his way to a meeting.
Who are rather stupid and gullible : How do you read Manley Pointer? Is he the Trickster of folk tales who is sly and takes advantage of ordinary people, who are rather stupid and gullible?
How is the sociology of law different from legal : How is the Sociology of Law different from Legal Jurisprudence? In your response, please be sure to define both the Sociology of Law
What components-proposed to increase nation cybersecurity : Security The Office of Cyber and Infrastructure Analysis (OCIA), a division of the U.S. Department of Homeland Security, strives to thwart and respond.
How does he or she want to influence the reader : What is the author's argument? how does s/he want to influence the reader? Does the author rely on any logical fallacies to make his /her claim?
Discuss what phenomenon has engulfed europe : Russia is currently trying to expand its sphere of influence by conducting military operations in this country
What is the value of the cost pool : What is the value of the cost pool - What is the dollar allocation to each patient services department - What is the fee schedule assuming that these overhead
Majority member in whs : EY now learns that Roberta is the majority member in WHS. The directors are angry and want to know what can be done.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd