Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
1. Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure: https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
After reading chapter 1 and looking at the link above look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber-attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation. – 1 page
2. Read chapters 2&3 and https://www.rebex.net/kb/secure-ftp/ (Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.)
In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet. It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats. – 1 page
Text book: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright © 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3)
3. Read chapter 1 – Information Governance failures have cost businesses and governments millions and billions of dollars. The course text provides the NSA & Edward Snowden along with Ford Motor Company as examples of what failing to implement a program that works correctly can result.
Find an example of a business that had a failure in Information Governance. Provide 2 page explaining the who, what, when, why and how of the failure. Include 3-5 citations in APA format.