Discussion and responses-2_ETC

Discussion and responses-2_ETC

Subject: Emerging Threats & Countermeas

Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/pr…

After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

You must do the following:

1) As indicated above, please explain how DHS should handle the situation described in the preceding paragraph. (Around 500 to 600 words) need to submit by Wednesday(in next 48 hours)

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread. (need to submit by anytime between thursday to saturday)

To guide your discussions, please consider the following questions:

What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?

Required Resources

Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
Watch the 2 videos below as part of the Lecture. – https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5629922?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25201%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190903T002626Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190903%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=04d2784d0c01ced14e43bef24edf4b085a2b01d440d49d269de9df8930d86b29
What is a Botnet Attack? https://study.com/academy/lesson/what-is-a-botnet-attack-definition-examples.html

Affects of Cyber Attacks on critical Infrastructure: https://www.youtube.com/watch?v=FmnLa3F5Piw

 

 

Solution Preview

Response to Emerging Threats and Countermeasure
Response to Topic 1 JSN
Recently, the rate of cyber-attacks in the United States has been tremendously rising, causing worries among the federal agencies and American citizens (Amoroso, 2012). The Department of Homeland Security together with the FBI recently reported more than 80,000 cyber-attacks (Amoroso, 2012).

(221 words)

Open chat
Hello
Contact us here via WhatsApp