University of Nairobi Critical Infrastructure Discussion Responses

User Generated

qbjagbjaenfpnyf

Writing

University of Nairobi

Description

  6 discussion responses 

 In Responses need to follow this pattern

What did you learn from your classmate's posting?

What additional questions do you have after reading the posting?

What clarification do you need regarding the posting?

What differences or similarities do you see between your posting and other classmates' postings?

Unformatted Attachment Preview

Discussion 1: Critical national infrastructure is essential for organizations, and even some government sectors are using it to provide services for the public. Large scale organizations and commercial enterprises like service providers, use complex support systems. The services provided by the framework include the emergency services to entertainment services. Some of them are customer entertainment, support for the military services, SCADA systems. The internet service providers, financial services like banks, insurance also come under this (Amoroso, 2013). There are many cons to this infrastructure as it is more prone to physical attacks in the United States. The attacks include tampering of the equipment and cable cuts. The cyber attacks are increased on the infrastructure with the introduction of computers, the internet, and software. There is a need to implement critical security measures to protect the infrastructure form the attacks. The scenario is about a cyber attack on the infrastructure where the attackers entered the system and paralyzed most of the services (Amoroso, 2013). DHS must protect the national infrastructure by implementing all the security measures like software updates and anti-malware up to date. The infrastructure needs strong firewall protection like a stateful firewall rather than the normal one, and intrusion detection systems will help to identify the virus entered the system. Using multi-level authentication before allowing the person to access the network and user education about the phishing attacks will protect the network. The techniques like encryption will encode the data and toughen the network for the attackers to decode it (Amoroso, 2013). After the attack, the DHS must react as soon as possible to reduce the effects of the attack and prevent them from extending the damage. They need to find out the starting point of the attack and how the inducers able to make the attack (West, 2016). The DHS must check the entire network for the affected areas and take appropriate measures to remove all the viruses from the system. They need to intimate the people about the attack and create awareness among them. They need to check all the vulnerabilities, if any, in the network and rectify them, and they have to disconnect the affected network and stop the remotely connected systems. DHS people must change the passwords and increase the password strength, and check the authentication of the network and who is accessing the system. After identifying the vulnerabilities, deploy security measures in the software and hardware of the network and use defense-in-depth, which provides multi-layer security (West, 2016). Discussion 2: In an incident where the United States suffers a massive cyber-attack, the department of homeland security has a role of responding to the attack to restore the affected significant government functions. The department has the responsibility of mobilizing the attack response team to facilitate the prevention of more damage by the attack. The response team, which requires the least time to form, will involve the shareholder parties in the government and a highly trained expert group to examine how the breach occurred. Also, a human resource representative for scenarios where employees suffer the attack, intellectual experts to assist in the recovery of sensitive government information and information experts who will ensure data is highly protected. The department has to involve legal agencies and alert them of the attack to help in creating awareness of the legal impacts of a cyber-attack. The team needs to include a representative of the department of defense forces to aid in providing crucial information regarding the effects of the attack and possible remedies that can mitigate the situation. The homeland security team will ensure the technical personnel secures the government systems to ensure the security breach is contained and the hacking of the essential operations is not ongoing. It will alert the department of defense to suspend some of its services or halt the entire activities that may compromise the security of the department. The technical team will have to identify the time of launching the attack and whether they can detect any possible signals of data intrusion. It is vital to employ an investigation team that will aid in establishing how the attack is implemented and whether there is an inside job from the government employees who could have played a role in facilitating China to paralyze the government operations. The department will then report back to the relevant authority of its findings and its counter-actions towards the situation (Rossi, 2015). Discussion 3: The United States will be majorly hit by a coordinated attack that might paralyze the normal operations of its critical infrastructure. The commercial ventures, along with the government agencies, would be severely hit, and the basic IT infrastructure of the firm shall be affected. The issue is severe as the attacks would be organized by China, one of the technologically advanced and powerful nations. The attacks have a direct impact on the satellite communications of the nation, and it will limit the DOD’s communication with agencies located overseas. The vital mission of DHS is to safeguard the Americans and secure the nation from constant threats by strengthening cybersecurity and responding to emergencies within the stipulated time. It is one of the federal agencies of the United States, and apart from border control, aviation security, and emergency response, it can play a vital role in preventing constant threats from China as well. Therefore, in order to deal with a probable attack, following steps can be taken. The secretary of DHS can collaborate with the OMB Director and can assess the risks of each agency. It is outlined in the Presidential Order that DHS can act in accordance with chapter 35 and subchapter II, title 4, U.S Code. After identifying the risks, they can work towards mitigation strategies (Powner, 2005). The risk assessment process is followed by the provision of technical assistance, and the assessment should be conducted before and after the incident. The department is supposed to share information with various entities, and it can act in accordance with “Homeland Security Act, 2002 (Bullock, Haddow & Coppola, 2002).” The investigation is part of the process, and DHS can investigate the ICT enabled crimes and the harm to intellectual theft, financial theft, and property theft. Apart from sharing information with federal agencies, DHS can also share information with the non-federal agencies, including the private sector and state governments. The type of information can be classified from an industry partner, or it can be an unclassified form of information as well. One of the goals of the DHS is to disrupt and prevent the increasing number of criminals from the usage of cyberspace. There has been a tremendous increase of sophisticated criminals in the cyber space, and the department can take active steps in enhancing its knowledge regarding computer forensics, cyber tradecraft, and digital investigations. The cybersecurity activities can be improved and managed only if the DHS starts integrating useful cybersecurity policy with other planning activities. In order to ensure consistency, the DHS needs to establish a range of internal mechanisms (Getha-Taylor, 2008). Therefore, it can be concluded that the DHS needs to prioritize various cybersecurity programs and identify gaps in the existing strategies so that it can achieve its cybersecurity objectives and goals. Apart from information sharing, the situation can be tackled by responding to the attacks on time. Cyberspace is one of the vulnerable areas that require immediate safeguarding. Discussion 4: DHS's role in strengthening the security of the United States against cyber-threats The anticipated cyber-attacks from China in the United States have become a significant concern. Sudden malicious attacks can weaken the nation’s critical infrastructure, and by 2020, there would be a rise in criminal activities. In case the electric grid of the country shuts down, it can have a severe impact on the communication channels. Firstly, the DOD or the Department of Defense would lose its ability to maintain its communication. Secondly, the anticipated attacks will hit the financial as well as commercial institutions operating in the U.S. The DHS can take active steps to assess the situation and prevent the risks. A brief overview of the responsibilities of DHS One of the government structures of the United States is the DHS. It can act as a threat actor and prevent cyber-related threats and accomplish various security missions. The structure has been established for the welfare of the U.S citizens. The different types of missions of the DHS include information sharing, protection of critical infrastructure, customs and immigration enforcement, the security of the transportation agency, and management of the federal emergency (Coldebella & White, 2010). Again, law enforcement is another functional area of the department. The DHS works in collaboration with federal agencies of the government. It is supposed to maintain agreements and work in collaboration with DOE and the NIST. The purpose is to ensure best practices in cybersecurity. Again, it also collaborates with the private sector and acts in accordance with the Cybersecurity Act 2015. It ensures that both the federal agencies and the private sector get informed about the probable incidents without delay. Identified action areas In order to handle the upcoming cyber-related threats, the president has already established the presidential order. It outlines the ways in which cyber-threats can be handled. The DHS has the responsibility of participating actively in the process and collaborating with the federal and private agencies. The areas of actions have been outlined belowAssessment of the evolving risks- Risks can be assessed by addressing the existing gaps in disaster preparedness. It would be possible to predict the upcoming or future risks as well. The department can focus on sector-specific agencies, including the General Services Administration and the Department of Defense (Hare, 2009). Ensuring the protection of the information systems of the federal government- The OMB or the Office of Management and Budget can help DHS in reducing organizational vulnerabilities and protecting the IS by continuing a close collaboration. Focusing on mitigating the cyber incidents- The coordinated attacks from China can directly affect the critical assets of the nation. Cyber incidents can be mitigated by focusing on the investigation (Von Solms & Van Niekerk, 2013). It would be vital to use both the DHS as well as the non-DHS resources for continuing the investigation process. Strengthening the reliability and security of ecosystems- In this case, the ecosystem refers to interdependent components of the infrastructure such as environment, people, and conditions and, most importantly, the norms. The expansion of cyber training programs would be effective as well. Discussion 5: United States Federal cyber-attack policies Cyber-attacks are a form of cybercrime, at which point an external attacker attacks a computer system intending to steal, destroy, gain access, or compromise a computer system or a network of multiple computers. These attacks are often backed by the intention of stealing important data or to compromise the computer systems. Federal network policies for cybersecurity The federal executive branch operates Information Technology (IT) practices on behalf of the American citizens. The data secured inside its systems should be secured using all the resources of the United States. In case of any data breach, the secretary of homeland security in coordination with the director of Federal Bureau of Investigation (FBI), director of national intelligence, and all other appropriate agency heads, shall identify the authorities and capabilities, that can be employed to assist the cybersecurity attempts to thwart the attacks, evaluate the security measures undertaken, and provide a detailed report to the president, which can be classified partly or fully. Within two hundred and forty days of issuing this order, the secretary of homeland defense should issue a preliminary report stating these efforts made by the department towards eliminating the effects of the attack, which should be made publicly available. Within one year, the secretary shall submit a detailed report to the president (Order, 2017). Handling the given cyber-attack situation In the given situation, the DHS needs to handle the situation from various tiers and through various dimensions (White, 2017). The legalities of the procedure should be followed up only after resolution against any possible suspected parties are attained. Suitable responses should be adopted, and more efficient security measures should be enforced. The DHS should be focused on solving the situation with appropriate response processes. The possible suspected networks must be isolated from others, and an attempt must be made to find out the source of the attack. This applies to both public and federal networks. In the given case, a large scale cyber-attack is perpetrated by a foreign country. For this, system threats should be removed by hiring adequately trained professionals (Torten, Reaiche & Boyle, 2018). It can be done under the authority of the secretary of defense and head of DHS. Also, the system should be scanned regularly, and networks should be monitored remotely to avoid such incidences in the future. Checks should be conducted in other departments as well, to ensure that they have implemented the necessary protocols. For the future, threat monitoring teams should be set up and trained appropriately so that any future instances can be avoided. If not, the firms should be instructed to adopt necessary safety protocols. Different firms and organizations may have a different set of cyber protection laws, which might not be sufficient. To eliminate these problems, national-level cybersecurity standards must be implemented so that the isolated failures (and the security bottlenecks that come with it) can be avoided or, at the very least, can be minimized. Users all over the country should be made aware of these external threats by the federal departments by the use of publicly accessible domains such as official websites and information brochures. Discussion 6: DHS protects and advances national and homeland security as part of the U.S. Government's goal to provide government, business, and individuals with assurance against extreme and unusual threat conditions. DHS is to lead a collaboration among cybersecurity experts and industry to quickly identify threats and develop technologies to effectively protect U.S. systems and critical infrastructure from harm (Lewis, 2020). Department of Homeland Security (DHS) has a cyber threat capacity that is among the strongest in the government and society, with a primary focus on preventing, disrupting, and degrading these threats. DHS continues to perform a wide range of cyber exercises to test its ability to respond to cybersecurity threats and assess its ability to respond to an emergency or catastrophic incident that impact critical infrastructure (Lewis, 2020). Additionally, DHS continuously works with industry, academia, and the general public to foster cooperation in order to address cybersecurity threats. DHS strives to support effective operations and programs that provide direction and guidance to prevent, detect, and mitigate cyber risk to the nation's infrastructure and critical systems. DHS gathers and analyzes a wide range of information, including what makes these threats unique to the United States and the urgent nature of the cyber threats, conducts targeted investigations and rigorous analysis to improve its understanding of key indicators and cyber threats; works closely with the private sector to achieve effective, efficient cyber protection and protect the public's privacy, and supports cross-sector work to strengthen international collaboration and address growing cross-border threats (George, 2020). DHS Executive order will lead to the development of standard guidelines and guidelines for critical infrastructure and its cybersecurity. They are grateful for this working relationship that allows the critical infrastructure community to realize the benefits of sharing best practices. DHS is currently working with its Critical Infrastructure Partners to understand better what they are doing, to share best practices, and to ensure they have the right tools, as well as the expertise to make informed decisions (Lewis, 2020). DHS takes a risk-based approach to protect critical infrastructure, and its actions are designed to protect the homeland and the U.S. from cyberattacks and intrusions to these systems. U.S. intelligence officials said. The attacks may be of increasing complexity, in particular by combining hacking capabilities of different organizations and engaging with individual citizens in the network. They will likely happen during peak hours, as people wake up in the morning, check their emails, and surf the Internet (George, 2020). Instructions: • Need 150 words for each response (Total 6 responses 900 words) • No References Needed • In Responses need to follow this pattern o What did you learn from your classmate's posting? o What additional questions do you have after reading the posting? o What clarification do you need regarding the posting? o What differences or similarities do you see between your posting and other classmates' postings? Discussion 1: Critical national infrastructure is essential for organizations, and even some government sectors are using it to provide services for the public. Large scale organizations and commercial enterprises like service providers, use complex support systems. The services provided by the framework include the emergency services to entertainment services. Some of them are customer entertainment, support for the military services, SCADA systems. The internet service providers, financial services like banks, insurance also come under this (Amoroso, 2013). There are many cons to this infrastructure as it is more prone to physical attacks in the United States. The attacks include tampering of the equipment and cable cuts. The cyber-attacks are increased on the infrastructure with the introduction of computers, the internet, and software. There is a need to implement critical security measures to protect the infrastructure form the attacks. The scenario is about a cyber-attack on the infrastructure where the attackers entered the system and paralyzed most of the services (Amoroso, 2013). DHS must protect the national infrastructure by implementing all the security measures like software updates and anti-malware up to date. The infrastructure needs strong firewall protection like a stateful firewall rather than the normal one, and intrusion detection systems will help to identify the virus entered the system. Using multi-level authentication before allowing the person to access the network and user education about the phishing attacks will protect the network. The techniques like encryption will encode the data and toughen the network for the attackers to decode it (Amoroso, 2013). After the attack, the DHS must react as soon as possible to reduce the effects of the attack and prevent them from extending the damage. They need to find out the starting point of the attack and how the inducers able to make the attack (West, 2016). The DHS must check the entire network for the affected areas and take appropriate measures to remove all the viruses from the system. They need to intimate the people about the attack and create awareness among them. They need to check all the vulnerabilities, if any, in the network and rectify them, and they have to disconnect the affected network and stop the remotely connected systems. DHS people must change the passwords and increase the password strength and check the authentication of the network and who is accessing the system. After identifying the vulnerabilities, deploy security measures in the software and hardware of the network and use defense-in-depth, which provides multi-layer security (West, 2016). Discussion 2: In an incident where the United States suffers a massive cyber-attack, the department of homeland security has a role of responding to the attack to restore the affected significant government functions. The department has the responsibility of mobilizing the attack response team to facilitate the prevention of more damage by the attack. The response team, which requires the least time to form, will involve the shareholder parties in the government and a highly trained expert group to examine how the breach occurred. Also, a human resource representative for scenarios where employees suffer the attack, intellectual experts to assist in the recovery of sensitive government information and information experts who will ensure data is highly protected. The department has to involve legal agencies and alert them of the attack to help in creating awareness of the legal impacts of a cyber-attack. The team needs to include a representative of the department of defense forces to aid in providing crucial information regarding the effects of the attack and possible remedies that can mitigate the situation. The homeland security team will ensure the technical personnel secures the government systems to ensure the security breach is contained and the hacking of the essential operations is not ongoing. It will alert the department of defense to suspend some of its services or halt the entire activities that may compromise the security of the department. The technical team will have to identify the time of launching the attack and whether they can detect any possible signals of data intrusion. It is vital to employ an investigation team that will aid in establishing how the attack is implemented and whether there is an inside job from the government employees who could have played a role in facilitating China to paralyze the government operations. The department will then report back to the relevant authority of its findings and its counteractions towards the situation (Rossi, 2015). Discussion 3: The United States will be majorly hit by a coordinated attack that might paralyze the normal operations of its critical infrastructure. The commercial ventures, along with the government agencies, would be severely hit, and the basic IT infrastructure of the firm shall be affected. The issue is severe as the attacks would be organized by China, one of the technologically advanced and powerful nations. The attacks have a direct impact on the satellite communications of the nation, and it will limit the DOD’s communication with agencies located overseas. The vital mission of DHS is to safeguard the Americans and secure the nation from constant threats by strengthening cybersecurity and responding to emergencies within the stipulated time. It is one of the federal agencies of the United States, and apart from border control, aviation security, and emergency response, it can play a vital role in preventing constant threats from China as well. Therefore, in order to deal with a probable attack, following steps can be taken. The secretary of DHS can collaborate with the OMB Director and can assess the risks of each agency. It is outlined in the Presidential Order that DHS can act in accordance with chapter 35 and subchapter II, title 4, U.S Code. After identifying the risks, they can work towards mitigation strategies (Powner, 2005). The risk assessment process is followed by the provision of technical assistance, and the assessment should be conducted before and after the incident. The department is supposed to share information with various entities, and it can act in accordance with “Homeland Security Act, 2002 (Bullock, Haddow & Coppola, 2002).” The investigation is part of the process, and DHS can investigate the ICT enabled crimes and the harm to intellectual theft, financial theft, and property theft. Apart from sharing information with federal agencies, DHS can also share information with the non-federal agencies, including the private sector and state governments. The type of information can be classified from an industry partner, or it can be an unclassified form of information as well. One of the goals of the DHS is to disrupt and prevent the increasing number of criminals from the usage of cyberspace. There has been a tremendous increase of sophisticated criminals in the cyber space, and the department can take active steps in enhancing its knowledge regarding computer forensics, cyber tradecraft, and digital investigations. The cybersecurity activities can be improved and managed only if the DHS starts integrating useful cybersecurity policy with other planning activities. In order to ensure consistency, the DHS needs to establish a range of internal mechanisms (Getha-Taylor, 2008). Therefore, it can be concluded that the DHS needs to prioritize various cybersecurity programs and identify gaps in the existing strategies so that it can achieve its cybersecurity objectives and goals. Apart from information sharing, the situation can be tackled by responding to the attacks on time. Cyberspace is one of the vulnerable areas that require immediate safeguarding. Discussion 4: DHS's role in strengthening the security of the United States against cyber-threats The anticipated cyber-attacks from China in the United States have become a significant concern. Sudden malicious attacks can weaken the nation’s critical infrastructure, and by 2020, there would be a rise in criminal activities. In case the electric grid of the country shuts down, it can have a severe impact on the communication channels. Firstly, the DOD or the Department of Defense would lose its ability to maintain its communication. Secondly, the anticipated attacks will hit the financial as well as commercial institutions operating in the U.S. The DHS can take active steps to assess the situation and prevent the risks. A brief overview of the responsibilities of DHS One of the government structures of the United States is the DHS. It can act as a threat actor and prevent cyber-related threats and accomplish various security missions. The structure has been established for the welfare of the U.S citizens. The different types of missions of the DHS include information sharing, protection of critical infrastructure, customs and immigration enforcement, the security of the transportation agency, and management of the federal emergency (Coldebella & White, 2010). Again, law enforcement is another functional area of the department. The DHS works in collaboration with federal agencies of the government. It is supposed to maintain agreements and work in collaboration with DOE and the NIST. The purpose is to ensure best practices in cybersecurity. Again, it also collaborates with the private sector and acts in accordance with the Cybersecurity Act 2015. It ensures that both the federal agencies and the private sector get informed about the probable incidents without delay. Identified action areas In order to handle the upcoming cyber-related threats, the president has already established the presidential order. It outlines the ways in which cyber-threats can be handled. The DHS has the responsibility of participating actively in the process and collaborating with the federal and private agencies. The areas of actions have been outlined belowAssessment of the evolving risks- Risks can be assessed by addressing the existing gaps in disaster preparedness. It would be possible to predict the upcoming or future risks as well. The department can focus on sector-specific agencies, including the General Services Administration and the Department of Defense (Hare, 2009). Ensuring the protection of the information systems of the federal government- The OMB or the Office of Management and Budget can help DHS in reducing organizational vulnerabilities and protecting the IS by continuing a close collaboration. Focusing on mitigating the cyber incidents- The coordinated attacks from China can directly affect the critical assets of the nation. Cyber incidents can be mitigated by focusing on the investigation (Von Solms & Van Niekerk, 2013). It would be vital to use both the DHS as well as the non-DHS resources for continuing the investigation process. Strengthening the reliability and security of ecosystems- In this case, the ecosystem refers to interdependent components of the infrastructure such as environment, people, and conditions and, most importantly, the norms. The expansion of cyber training programs would be effective as well. Discussion 5: United States Federal cyber-attack policies Cyber-attacks are a form of cybercrime, at which point an external attacker attacks a computer system intending to steal, destroy, gain access, or compromise a computer system or a network of multiple computers. These attacks are often backed by the intention of stealing important data or to compromise the computer systems. Federal network policies for cybersecurity The federal executive branch operates Information Technology (IT) practices on behalf of the American citizens. The data secured inside its systems should be secured using all the resources of the United States. In case of any data breach, the secretary of homeland security in coordination with the director of Federal Bureau of Investigation (FBI), director of national intelligence, and all other appropriate agency heads, shall identify the authorities and capabilities, that can be employed to assist the cybersecurity attempts to thwart the attacks, evaluate the security measures undertaken, and provide a detailed report to the president, which can be classified partly or fully. Within two hundred and forty days of issuing this order, the secretary of homeland defense should issue a preliminary report stating these efforts made by the department towards eliminating the effects of the attack, which should be made publicly available. Within one year, the secretary shall submit a detailed report to the president (Order, 2017). Handling the given cyber-attack situation In the given situation, the DHS needs to handle the situation from various tiers and through various dimensions (White, 2017). The legalities of the procedure should be followed up only after resolution against any possible suspected parties are attained. Suitable responses should be adopted, and more efficient security measures should be enforced. The DHS should be focused on solving the situation with appropriate response processes. The possible suspected networks must be isolated from others, and an attempt must be made to find out the source of the attack. This applies to both public and federal networks. In the given case, a large-scale cyber-attack is perpetrated by a foreign country. For this, system threats should be removed by hiring adequately trained professionals (Torten, Reaiche & Boyle, 2018). It can be done under the authority of the secretary of defense and head of DHS. Also, the system should be scanned regularly, and networks should be monitored remotely to avoid such incidences in the future. Checks should be conducted in other departments as well, to ensure that they have implemented the necessary protocols. For the future, threat monitoring teams should be set up and trained appropriately so that any future instances can be avoided. If not, the firms should be instructed to adopt necessary safety protocols. Different firms and organizations may have a different set of cyber protection laws, which might not be sufficient. To eliminate these problems, national-level cybersecurity standards must be implemented so that the isolated failures (and the security bottlenecks that come with it) can be avoided or, at the very least, can be minimized. Users all over the country should be made aware of these external threats by the federal departments by the use of publicly accessible domains such as official websites and information brochures. Discussion 6: DHS protects and advances national and homeland security as part of the U.S. Government's goal to provide government, business, and individuals with assurance against extreme and unusual threat conditions. DHS is to lead a collaboration among cybersecurity experts and industry to quickly identify threats and develop technologies to effectively protect U.S. systems and critical infrastructure from harm (Lewis, 2020). Department of Homeland Security (DHS) has a cyber threat capacity that is among the strongest in the government and society, with a primary focus on preventing, disrupting, and degrading these threats. DHS continues to perform a wide range of cyber exercises to test its ability to respond to cybersecurity threats and assess its ability to respond to an emergency or catastrophic incident that impact critical infrastructure (Lewis, 2020). Additionally, DHS continuously works with industry, academia, and the general public to foster cooperation in order to address cybersecurity threats. DHS strives to support effective operations and programs that provide direction and guidance to prevent, detect, and mitigate cyber risk to the nation's infrastructure and critical systems. DHS gathers and analyzes a wide range of information, including what makes these threats unique to the United States and the urgent nature of the cyber threats, conducts targeted investigations and rigorous analysis to improve its understanding of key indicators and cyber threats; works closely with the private sector to achieve effective, efficient cyber protection and protect the public's privacy, and supports cross-sector work to strengthen international collaboration and address growing cross-border threats (George, 2020). DHS Executive order will lead to the development of standard guidelines and guidelines for critical infrastructure and its cybersecurity. They are grateful for this working relationship that allows the critical infrastructure community to realize the benefits of sharing best practices. DHS is currently working with its Critical Infrastructure Partners to understand better what they are doing, to share best practices, and to ensure they have the right tools, as well as the expertise to make informed decisions (Lewis, 2020). DHS takes a risk-based approach to protect critical infrastructure, and its actions are designed to protect the homeland and the U.S. from cyberattacks and intrusions to these systems. U.S. intelligence officials said. The attacks may be of increasing complexity, in particular by combining hacking capabilities of different organizations and engaging with individual citizens in the network. They will likely happen during peak hours, as people wake up in the morning, check their emails, and surf the Internet (George, 2020). Instructions: • Need 150 words for each response (Total 6 responses 900 words) • No References Needed • In Responses need to follow this pattern o What did you learn from your classmate's posting? o What additional questions do you have after reading the posting? o What clarification do you need regarding the posting? o What differences or similarities do you see between your posting and other classmates' postings?
Purchase answer to see full attachment
Explanation & Answer:
900 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, kindly find the attached completed work. Thank You

Running Head: CRITICAL INFRASTRUCTURE

Critical Infrastructure
Student’s Name
Course Title
Institutional Affiliation
Date

1

CRITICAL INFRASTRUCTURE

2

Response 1,
From my classmate's posting, I learned that critical infrastructure is essential in an
organization. Therefore, even some of the sectors in the government use it to provide services to
the public. I learn that complex support systems get used by both large scale and commercial
enterprises like service providers. Some of the services offered by the service providers include
emergency services to entertainment. Also, I have learned that there are disadvantages to having
improved infrastructure, such as physical attacks and cyberattacks. Some of these physical
attacks include cable and equipment cutting. Therefore, cyberattacks forcing security measures
to be imposed upon the infrastructure. I learned that there are various ways in which security can
get implemented. Security measures can be achieved through updating software and using antimalware that is up to date, using multi-level authentication to ensure that only the authorized
people use the network. I have no additional questions, and the work is almost similar to mine
because I have talked about critical infrastructure and its advantages and disadvantages.
Response 2,
From my classmate's posting, I have learned that cyber-attack are a common problem in
the united states. Therefore the homeland ...


Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags