BSS 482 Inspiring Minds/uophelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

BSS 482 Inspiring Minds/uophelp.com

Description:

For more course tutorials visit www.uophelp.com Write a 1,450- to 2,100-word research paper on border and transportation security systems. Include the following in your paper: An analysis of the strengths and weaknesses in border and transportation security. Include both physical systems and cybersystems in your analysis. An explanation of the best practices for improving border and transportation security systems. Include practices for both physical systems and cybersystems. Provide examples and references to support your research. Format your research paper consistent with APA guidelines – PowerPoint PPT presentation

Number of Views:2
Slides: 13
Provided by: anemones06

less

Transcript and Presenter's Notes

Title: BSS 482 Inspiring Minds/uophelp.com


1
BSS 482 Inspiring Minds/uophelp.com
  • For more course tutorials visit
  • www.uophelp.com

2
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Discussion Questions (5 DQs)
  • For more course tutorials visit
  • www.uophelp.com
  • 1. What do the terms protection, mitigation, and
    recovery refer to? What types of actions
    constitute as protection, mitigation, and
    recovery? What are some examples of current
    events in which the local, state, or federal
    governments have implemented such actions?
    (Minimum of 125 words)
  • 2. Select two types of infrastructure assets,
    such as a large dam and a major rail station. How
    do the asset protection techniques differ, and
    how are they similar? Remember to consider
    physical, cyber, and human risk
    considerations.(Minimum of 125 words)

3
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Discussion Questions
  • For more course tutorials visit
  • www.uophelp.com
  • How can access to cyber systems create an
    economic gain if not detected? How does this
    situation differ from disrupting a critical
    infrastructure system? What are some other
    motives malicious actors may have for accessing
    or disrupting a critical infrastructure system?
    (Minimum of 250 words)
  •  
  •  
  • Why are humans considered a critical
    infrastructure asset? What security practices
    must be done to protect them from being
    exploited? (Minimum of 250 words)

4
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Literature Review and Mitigating Risks
    Annotated Bibliography
  • For more course tutorials visit
  • www.uophelp.com
  • Literature Review and Mitigating Risks Annotated
    Bibliography
  • Conduct a literature review on security practices
    related to human and property assets. Review two
    articles from the reputable source and create
    separately (Minimum of 85 words each)
  • Also create a table to accompany the annotated
    bibliography that describes the pros and cons of
    each security practice.

5
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Supervisory Control and Data Acquisition
  • For more course tutorials visit
  • www.uophelp.com
  • What is Supervisory Control and Data Acquisition
    (SCADA)? What are the potential risks to SCADA by
    malicious actors? How might organizations protect
    their control systems from a compromise or an
    attack that affects critical infrastructure?

6
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 U.S. border entry points
  • For more course tutorials visit
  • www.uophelp.com
  • The following U.S. border entry points
  • New York via commercial airplane
  • Detroit via commercial transport truck
    highway
  • Vancouver to Seattle via intercity
    passenger train
  • Compare the security practices used for the three
    modes of transportation.

7
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Week 1 Sectors Partnerships Paper
  • For more course tutorials visit
  • www.uophelp.com
  • Review the Sector Overviews and Partnerships
    sections of the U.S. Department of Homeland
    Securitys Critical Infrastructure Resource
    Center.
  • Select a critical infrastructure sector that
    interests you and imagine that you are working in
    a position in this sector.
  • Write a 750- to 1050-word paper based on the job
    position and critical infrastructure sector you
    selected.
  • Answer the following questions in your paper

8
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Week 2 Infrastructure Asset Protection
  • For more course tutorials visit
  • www.uophelp.com
  • Infrastructure Asset Protection
  • Explain Briefly describe how computers
    and humans can pose risks to infrastructure
    assets.
  • Identify two physical techniques and
    two cybertechniques used to attack communications
    infrastructure.
  • Explain the implications of the risks
    and techniques on critical infrastructure
    sectors.
  • Describe how humans and computers can
    protect against the risks and techniques.
  • (Minimum of 550 words)
  • With proper citation and reference.

9
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Week 3 Attacks and Counterstrategy
  • For more course tutorials visit
  • www.uophelp.com
  • Part I Role of the Malicious Actor
  • Your supervisor asks you to write a report in
    which you imagine that you are a malicious actor
    interested in exploiting or harming U.S. critical
    infrastructure.
  • Identify two critical infrastructure sectors you
    will attack, your motives for attacking and
    exploiting the sectors, the sectors potential
    vulnerabilities, and the approaches you will take
    to exploit the vulnerabilities in the following
    table.

10
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Week 4 Critical Infrastructure and
    National Planning
  • For more course tutorials visit
  • www.uophelp.com
  • Select a recent annual plenary meeting report of
    the U.S. Department of Homeland Securitys
    Critical Infrastructure Partnership Advisory
    Council (CIPAC). http//www.dhs.gov/critical-infra
    structure-partnership-advisory-council
  • Write a 700- to 1050-word paper based on the
    selected CIPAC annual plenary meeting report. ?
  • Include the following in your paper
  • Describe one of the national planning
    approaches covered in the annual report. Explain
    how prevention, protection, mitigation, response,
    and recovery were integrated into the approach.

11
BSS 482 Inspiring Minds/uophelp.com
  • BSS 482 Week 5 Border and Transportation Security
  • For more course tutorials visit
  • www.uophelp.com
  • Write a 1,450- to 2,100-word research paper on
    border and transportation security systems.
  • Include the following in your paper
  • An analysis of the strengths and weaknesses in
    border and transportation security. Include both
    physical systems and cybersystems in your
    analysis.
  • An explanation of the best practices for
    improving border and transportation security
    systems. Include practices for both physical
    systems and cybersystems.

12
BSS 482 Inspiring Minds/uophelp.com
  • For more course tutorials visit
  • www.uophelp.com
Write a Comment
User Comments (0)
About PowerShow.com