SlideShare a Scribd company logo
1 of 1
Evaluate the Presidential Order that relates to strengthening
cybersecurity that relates to critical infrastructure:
https://www.whitehouse.gov/presidential-actions/presidential-
executive-order-strengthening-cybersecurity-federal-networks-
critical-infrastructure/
Look at a real-world scenario and how the Department of
Homeland Security (DHS) plays into it. In the scenario, the
United States will be hit by a large-scale, coordinated cyber
attack organized by China. These attacks debilitate the
functioning of government agencies, parts of the critical
infrastructure, and commercial ventures. The IT infrastructure
of several agencies are paralyzed, the electric grid in most of
the country is shut down, telephone traffic is seriously limited
and satellite communications are down (limiting the Department
of Defense’s [DOD’s] ability to communicate with commands
overseas). International commerce and financial institutions are
also severely hit. Please explain how DHS should handle this
situation.
Your initial response is due by Thursday of each week of the
course and you must respond to a minimum of two other
learners during the week. In APA format.

More Related Content

Similar to Evaluate the Presidential Order that relates to strengthening cybers

36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
rhetttrevannion
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Mark Raduenzel
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
Lucy Kitchin
 
1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx
jackiewalcutt
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 

Similar to Evaluate the Presidential Order that relates to strengthening cybers (14)

Let’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docxLet’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docx
 
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
 
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
Raduenzel_Mark_FinalAssignment_NSEC506_Fall2015
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
CyberSecurityBook[Final]
CyberSecurityBook[Final]CyberSecurityBook[Final]
CyberSecurityBook[Final]
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 

More from galinagrabow44ms

DetailsThis assignment is a presentation that allows you to apply.docx
DetailsThis assignment is a presentation that allows you to apply.docxDetailsThis assignment is a presentation that allows you to apply.docx
DetailsThis assignment is a presentation that allows you to apply.docx
galinagrabow44ms
 
DetailsHours 2Review the children’s section at a local booksto.docx
DetailsHours 2Review the children’s section at a local booksto.docxDetailsHours 2Review the children’s section at a local booksto.docx
DetailsHours 2Review the children’s section at a local booksto.docx
galinagrabow44ms
 
DetailsFollow the instructions provided in Critique of Research .docx
DetailsFollow the instructions provided in Critique of Research .docxDetailsFollow the instructions provided in Critique of Research .docx
DetailsFollow the instructions provided in Critique of Research .docx
galinagrabow44ms
 
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docxDetails Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
galinagrabow44ms
 

More from galinagrabow44ms (20)

Develop a week-long plan for group time appropriate for 2-year-olds .docx
Develop a week-long plan for group time appropriate for 2-year-olds .docxDevelop a week-long plan for group time appropriate for 2-year-olds .docx
Develop a week-long plan for group time appropriate for 2-year-olds .docx
 
Develop a Threat Process Model.  The threat process model must conta.docx
Develop a Threat Process Model.  The threat process model must conta.docxDevelop a Threat Process Model.  The threat process model must conta.docx
Develop a Threat Process Model.  The threat process model must conta.docx
 
Develop a personal budget as part of a financial plan.  As part of.docx
Develop a personal budget as part of a financial plan.  As part of.docxDevelop a personal budget as part of a financial plan.  As part of.docx
Develop a personal budget as part of a financial plan.  As part of.docx
 
Develop a Skills Assessment Summary Web Page An Artifact for the eP.docx
Develop a Skills Assessment Summary Web Page An Artifact for the eP.docxDevelop a Skills Assessment Summary Web Page An Artifact for the eP.docx
Develop a Skills Assessment Summary Web Page An Artifact for the eP.docx
 
Develop a Project Charter Write a 700 to 900-word paper featurin.docx
Develop a Project Charter Write a 700 to 900-word paper featurin.docxDevelop a Project Charter Write a 700 to 900-word paper featurin.docx
Develop a Project Charter Write a 700 to 900-word paper featurin.docx
 
develop a process map (submit map as an attachment to your post ).docx
develop a process map (submit map as an attachment to your post ).docxdevelop a process map (submit map as an attachment to your post ).docx
develop a process map (submit map as an attachment to your post ).docx
 
develop a lesson plan for students with a severe disability.citati.docx
develop a lesson plan for students with a severe disability.citati.docxdevelop a lesson plan for students with a severe disability.citati.docx
develop a lesson plan for students with a severe disability.citati.docx
 
Develop a chart that lists theo characteristics of congenital he.docx
Develop a chart that lists theo characteristics of congenital he.docxDevelop a chart that lists theo characteristics of congenital he.docx
Develop a chart that lists theo characteristics of congenital he.docx
 
Determine why change is so difficult for organizations. Propose ways.docx
Determine why change is so difficult for organizations. Propose ways.docxDetermine why change is so difficult for organizations. Propose ways.docx
Determine why change is so difficult for organizations. Propose ways.docx
 
Determine the country in which your project company is headquartered.docx
Determine the country in which your project company is headquartered.docxDetermine the country in which your project company is headquartered.docx
Determine the country in which your project company is headquartered.docx
 
Determine the main reasons why visualization technologies are becomi.docx
Determine the main reasons why visualization technologies are becomi.docxDetermine the main reasons why visualization technologies are becomi.docx
Determine the main reasons why visualization technologies are becomi.docx
 
determine the best possible way to leverage Facebook, Twitter, and o.docx
determine the best possible way to leverage Facebook, Twitter, and o.docxdetermine the best possible way to leverage Facebook, Twitter, and o.docx
determine the best possible way to leverage Facebook, Twitter, and o.docx
 
DetailsWrite an essay of 750-1,000 words that analyzes issues inv.docx
DetailsWrite an essay of 750-1,000 words that analyzes issues inv.docxDetailsWrite an essay of 750-1,000 words that analyzes issues inv.docx
DetailsWrite an essay of 750-1,000 words that analyzes issues inv.docx
 
DetailsThis assignment is a presentation that allows you to apply.docx
DetailsThis assignment is a presentation that allows you to apply.docxDetailsThis assignment is a presentation that allows you to apply.docx
DetailsThis assignment is a presentation that allows you to apply.docx
 
DetailsHours 2Review the children’s section at a local booksto.docx
DetailsHours 2Review the children’s section at a local booksto.docxDetailsHours 2Review the children’s section at a local booksto.docx
DetailsHours 2Review the children’s section at a local booksto.docx
 
DetailsFollow the instructions provided in Critique of Research .docx
DetailsFollow the instructions provided in Critique of Research .docxDetailsFollow the instructions provided in Critique of Research .docx
DetailsFollow the instructions provided in Critique of Research .docx
 
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docxDetails Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
Details Please read instructions carefully. ORGINAL WORK PLEASE. Th.docx
 
Detail personality differences that create a hostile working environ.docx
Detail personality differences that create a hostile working environ.docxDetail personality differences that create a hostile working environ.docx
Detail personality differences that create a hostile working environ.docx
 
Design Project PortfolioBasic requirements 1. Create an assembly.docx
Design Project PortfolioBasic requirements 1. Create an assembly.docxDesign Project PortfolioBasic requirements 1. Create an assembly.docx
Design Project PortfolioBasic requirements 1. Create an assembly.docx
 
Design and code your own LIFO Stack using single liked list to hold .docx
Design and code your own LIFO Stack using single liked list to hold .docxDesign and code your own LIFO Stack using single liked list to hold .docx
Design and code your own LIFO Stack using single liked list to hold .docx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Evaluate the Presidential Order that relates to strengthening cybers

  • 1. Evaluate the Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure: https://www.whitehouse.gov/presidential-actions/presidential- executive-order-strengthening-cybersecurity-federal-networks- critical-infrastructure/ Look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation. Your initial response is due by Thursday of each week of the course and you must respond to a minimum of two other learners during the week. In APA format.