BSS 482 Course Great Wisdom / tutorialrank.com - PowerPoint PPT Presentation

About This Presentation
Title:

BSS 482 Course Great Wisdom / tutorialrank.com

Description:

For more course tutorials visit www.tutorialrank.com 1. What do the terms protection, mitigation, and recovery refer to? What types of actions constitute as protection, mitigation, and recovery? What are some examples of current events in which the local, state, or federal governments have implemented such actions? (Minimum of 125 words) 2. Select two types of infrastructure assets, such as a large dam and a major rail station. How do the asset protection techniques differ, and how are they similar? Remember to consider physical, cyber, and human risk considerations.(Minimum of 125 words) 3. Cloud computing is becoming more popular. What is cloud computing? Why – PowerPoint PPT presentation

Number of Views:8
Slides: 9
Provided by: jabbaree132

less

Transcript and Presenter's Notes

Title: BSS 482 Course Great Wisdom / tutorialrank.com


1
BSS 482 Course Great Wisdom-tutorialrank.com
For More Tutorials
www.tutorialrank.com
2
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 Discussion Questions (5 DQs)
  • BSS 482 Discussion Questions
  • 1. What do the terms protection, mitigation,
    and recovery refer to? What types of actions
    constitute as protection, mitigation, and
    recovery? What are some examples of current
    events in which the local, state, or federal
    governments have implemented such actions?
    (Minimum of 125 words)
  • How can access to cyber systems create an
    economic gain if not detected? How does this
    situation differ from disrupting a critical
    infrastructure system? What are some other
    motives malicious actors may have for accessing
    or disrupting a critical infrastructure system?
    (Minimum of 250 words)

3
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 DQ threats to infrastructure assets
  • BSS 482 Literature Review and Mitigating Risks
    Annotated Bibliography
  • What types of threats do humans pose to
    infrastructure assets? How have threats from
    malicious actors evolved with technology
    advancements? What physical techniques and
    cybertechniques do terrorists and malicious
    actors use? Provide examples. (Minimum of 200
    words)
  • Literature Review and Mitigating Risks Annotated
    Bibliography
  • Conduct a literature review on security practices
    related to human and property assets.

4
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 Supervisory Control and Data Acquisition
  • BSS 482 U.S. border entry points
  • What is Supervisory Control and Data Acquisition
    (SCADA)? What are the potential risks to SCADA by
    malicious actors? How might organizations protect
    their control systems from a compromise or an
    attack that affects critical infrastructure?
  • The following U.S. border entry points
  • New York via commercial airplane
  • Detroit via commercial transport truck highway
  • Vancouver to Seattle via intercity passenger
    train

5
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 Week 1 Sectors Partnerships Paper
  • BSS 482 Week 2 Infrastructure Asset Protection
  • Review the Sector Overviews and Partnerships
    sections of the U.S. Department of Homeland
    Securitys Critical Infrastructure Resource
    Center.
  •  
  • Select a critical infrastructure sector that
    interests
  • Infrastructure Asset Protection
  • Explain Briefly describe how computers and
    humans can pose risks to infrastructure assets.
  • Identify two physical techniques and two
    cybertechniques used to attack communications
    infrastructure.

6
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 Week 3 Attacks and Counterstrategy
  • BSS 482 Week 4 Critical Infrastructure and
    National Planning
  • Your supervisor asks you to write a report in
    which you imagine that you are a malicious actor
    interested in exploiting or harming U.S. critical
    infrastructure.
  • Identify two critical infrastructure sectors you
    will attack, your motives for attacking and
    exploiting the sectors, the sectors potential
    vulnerabilities, and the approaches
  • Select a recent annual plenary meeting report of
    the U.S. Department of Homeland Securitys
    Critical Infrastructure Partnership Advisory
    Council (CIPAC). http//www.dhs.gov/critical-infra
    structure-partnership-advisory-council

7
BSS 482 Course Great Wisdom-tutorialrank.com
  • BSS 482 Week 5 Border and Transportation Security
  • BSS 482 Week 4 Critical Infrastructure and
    National Planning
  • Write a 1,450- to 2,100-word research paper on
    border and transportation security systems.
  • Include the following in your paper
  • An analysis of the strengths and weaknesses in
    border and transportation security. Include both
    physical systems and cybersystems in your
    analysis.
  • Select a recent annual plenary meeting report of
    the U.S. Department of Homeland Securitys
    Critical Infrastructure Partnership Advisory
    Council (CIPAC). http//www.dhs.gov/critical-infra
    structure-partnership-advisory-council

8
BSS 482 Course Great Wisdom-tutorialrank.com
For More Tutorials
www.tutorialrank.com
Write a Comment
User Comments (0)
About PowerShow.com