unit 6 assignment

User Generated

Zbzzlzrqvp1016

Health Medical

Description

jounal
Instructions

Chapter 9 of the textbook describes cybersecurity, aviation security, border security, and port security as the four porous nodes that present vulnerable access by terrorists to infiltrate and harm the homeland. As a director of the U.S. Department of Homeland Security, identify the node that you consider to be the most vulnerable. Why do you feel that this node is the most vulnerable? Describe the actions and resources required to prevent a terrorist attack.

Your journal entry must be at least 200 words. No references or citations are necessary.

2nd paper

Instructions

Review the information from the resources below, and answer the associated questions.

Part I: Cyberterrorism

Click the link below to view Segment 2 (“Cyber-Terrorism”) of Cybercrime: World Wide War 3.0 in CSU’s Films on Demand database.

Ways Press International (Producer). (2008). Cybercrime: World Wide War 3.0 [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/logi...

Note: The transcript for the aforementioned video segment is available to view and print by clicking on the “Show Transcript” tab on the right side of the video page.

After watching the video, address the questions below:

  1. What is cyberterrorism?
  2. What is the purpose of cyberterrorism?
  3. What are the advantages of cyberterrorism?

Part II: Federal Networks

Click the link below to review the following resource.

U.S. Department of Homeland Security. (n.d.). Securing federal networks. Retrieved from https://www.dhs.gov/topic/securing-federal-network...

After reviewing the resource, address the following issues:

  1. Describe the purpose of the U.S. Department of Homeland Security to secure federal networks.
  2. What is the mission of the National Cyber Security Protection System (NCPS), and what capabilities does it provide to protect the federal government from a cyberterrorism attack?
  3. What is the Continuous Diagnostics and Mitigation (CDM) program, who does it benefit, and what capabilities does the program provide?
  4. What is the purpose of the Federal Information Security Management Act (FISMA)?

Your assignment must be a minimum of three pages in length. Submit Part I and Part II in one document, but make certain to use headings to identify each part. You are required to use at least one outside source other than the textbook. All sources used, including the textbook and associated web links, must be referenced; paraphrased and quoted material must have accompanying APA citations. All sources must be cited in APA format on a separate reference page. The reference page does not count toward meeting the minimum page requirement.

Resources


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Ignore the requ...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags