SlideShare a Scribd company logo
1 of 1
Chapter 1 provided a high-level overview of the need for a
national framework for protecting critical infrastructure. For
some additional reading, take a look at the latest Presidential
Order that relates to strengthening cybersecurity that relates to
critical infrastructure:
https://www.whitehouse.gov/presidential-actions/presidential-
executive-order-strengthening-cybersecurity-federal-networks-
critical-infrastructure/
After reading chapter 1 and looking at the link above, you're
ready to participate in the first discussion.
Let’s look at a real-world scenario and how the Department of
Homeland Security (DHS) plays into it. In the scenario, the
United States will be hit by a large-scale, coordinated cyber
attack organized by China. These attacks debilitate the
functioning of government agencies, parts of the critical
infrastructure, and commercial ventures. The IT infrastructure
of several agencies are paralyzed, the electric grid in most of
the country is shut down, telephone traffic is seriously limited
and satellite communications are down (limiting the Department
of Defense’s [DOD’s] ability to communicate with commands
overseas). International commerce and financial institutions are
also severely hit. Please explain how DHS should handle this
situation.
Around 300-400 words

More Related Content

Similar to Chapter 1 provided a high-level overview of the need for a national .docx

36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docxrhetttrevannion
 
Campbellsville University Department of Homeland Security Situation.docx
Campbellsville University Department of Homeland Security Situation.docxCampbellsville University Department of Homeland Security Situation.docx
Campbellsville University Department of Homeland Security Situation.docxstirlingvwriters
 
Let’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docxLet’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docxmanningchassidy
 
Michael Fertik on KTRH Houston -- 10/26/09
Michael Fertik on KTRH Houston -- 10/26/09Michael Fertik on KTRH Houston -- 10/26/09
Michael Fertik on KTRH Houston -- 10/26/09Michael Fertik
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxgilpinleeanna
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docxfelicidaddinwoodie
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internetjohn.niemela
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 

Similar to Chapter 1 provided a high-level overview of the need for a national .docx (13)

36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx36044 Topic Emerging threats and counter measuresNumber of Pa.docx
36044 Topic Emerging threats and counter measuresNumber of Pa.docx
 
Campbellsville University Department of Homeland Security Situation.docx
Campbellsville University Department of Homeland Security Situation.docxCampbellsville University Department of Homeland Security Situation.docx
Campbellsville University Department of Homeland Security Situation.docx
 
Let’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docxLet’s look at a real-world scenario and how the Department of Homela.docx
Let’s look at a real-world scenario and how the Department of Homela.docx
 
Michael Fertik on KTRH Houston -- 10/26/09
Michael Fertik on KTRH Houston -- 10/26/09Michael Fertik on KTRH Houston -- 10/26/09
Michael Fertik on KTRH Houston -- 10/26/09
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
Bill Would Give President Emergency Control Of Internet
Bill Would Give President Emergency Control Of  InternetBill Would Give President Emergency Control Of  Internet
Bill Would Give President Emergency Control Of Internet
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 

More from zebadiahsummers

Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxChapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxzebadiahsummers
 
Chapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxChapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxzebadiahsummers
 
Chapter 10 Case Project 10-2 two page report double spaceCas.docx
Chapter 10 Case Project 10-2 two page report double spaceCas.docxChapter 10 Case Project 10-2 two page report double spaceCas.docx
Chapter 10 Case Project 10-2 two page report double spaceCas.docxzebadiahsummers
 
Chapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxChapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxzebadiahsummers
 
Chapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxChapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxzebadiahsummers
 
Chapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxChapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxzebadiahsummers
 
Change is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxChange is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxzebadiahsummers
 
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxChapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxzebadiahsummers
 
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxChapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxzebadiahsummers
 
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxChapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxzebadiahsummers
 
Changes in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxChanges in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxzebadiahsummers
 
Chapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxChapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxzebadiahsummers
 
chapter 8 notes – Asian Americans model minoritieschapter b.docx
chapter  8 notes – Asian Americans model minoritieschapter b.docxchapter  8 notes – Asian Americans model minoritieschapter b.docx
chapter 8 notes – Asian Americans model minoritieschapter b.docxzebadiahsummers
 
CHAPTER 1 This list below indicated various audits, attestation,.docx
CHAPTER 1  This list below indicated various audits, attestation,.docxCHAPTER 1  This list below indicated various audits, attestation,.docx
CHAPTER 1 This list below indicated various audits, attestation,.docxzebadiahsummers
 
Challenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxChallenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxzebadiahsummers
 
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxChamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxzebadiahsummers
 
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxChamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxzebadiahsummers
 
Centralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxCentralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxzebadiahsummers
 
Challenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxChallenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxzebadiahsummers
 
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxCh.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxzebadiahsummers
 

More from zebadiahsummers (20)

Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docxChapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
Chapter 10 Theodore Dalrymple The Frivolity of Evil Theodore Dalrymp.docx
 
Chapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docxChapter 10 Check PointAnswer the following questions. Please.docx
Chapter 10 Check PointAnswer the following questions. Please.docx
 
Chapter 10 Case Project 10-2 two page report double spaceCas.docx
Chapter 10 Case Project 10-2 two page report double spaceCas.docxChapter 10 Case Project 10-2 two page report double spaceCas.docx
Chapter 10 Case Project 10-2 two page report double spaceCas.docx
 
Chapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docxChapter 1 provided a high-level overview of the Information Syst.docx
Chapter 1 provided a high-level overview of the Information Syst.docx
 
Chapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docxChapter 1 Intro to Policy Making in a The Digital Age.docx
Chapter 1 Intro to Policy Making in a The Digital Age.docx
 
Chapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docxChapter 1 discussed the expansion of the European intermodal rai.docx
Chapter 1 discussed the expansion of the European intermodal rai.docx
 
Change is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docxChange is an activity and mindset that many resists. Kotter proposed.docx
Change is an activity and mindset that many resists. Kotter proposed.docx
 
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docxChapter 1 Government Boss, financial partner, regulator – Entrepre.docx
Chapter 1 Government Boss, financial partner, regulator – Entrepre.docx
 
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docxChapter 1 Combating terrorism has entailed restrictions on civil li.docx
Chapter 1 Combating terrorism has entailed restrictions on civil li.docx
 
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docxChapter 1 Evaluation and Social Work Making the ConnectionP.docx
Chapter 1 Evaluation and Social Work Making the ConnectionP.docx
 
Changes in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docxChanges in the Human Figure in ArtYou likely noticed that during.docx
Changes in the Human Figure in ArtYou likely noticed that during.docx
 
Chapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docxChapter #131. Explain the terms Computationalism and Culturalism.docx
Chapter #131. Explain the terms Computationalism and Culturalism.docx
 
chapter 8 notes – Asian Americans model minoritieschapter b.docx
chapter  8 notes – Asian Americans model minoritieschapter b.docxchapter  8 notes – Asian Americans model minoritieschapter b.docx
chapter 8 notes – Asian Americans model minoritieschapter b.docx
 
CHAPTER 1 This list below indicated various audits, attestation,.docx
CHAPTER 1  This list below indicated various audits, attestation,.docxCHAPTER 1  This list below indicated various audits, attestation,.docx
CHAPTER 1 This list below indicated various audits, attestation,.docx
 
Challenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docxChallenges and Resources for Nurses Participating in a Hurrica.docx
Challenges and Resources for Nurses Participating in a Hurrica.docx
 
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docxChamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
Chamberlain College of NursingNR631 Nurse Executive Track—CGE I.docx
 
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docxChamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
Chamberlain College of NursingNR449 Evidence-Based PracticeEvide.docx
 
Centralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docxCentralized System for Strategic ResourcesIntroductionAttentio.docx
Centralized System for Strategic ResourcesIntroductionAttentio.docx
 
Challenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docxChallenge your thinking.10) After completing the WebQuest, has y.docx
Challenge your thinking.10) After completing the WebQuest, has y.docx
 
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docxCh.10 Discussion - Jingles33 unread replies.33 replies.D.docx
Ch.10 Discussion - Jingles33 unread replies.33 replies.D.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Chapter 1 provided a high-level overview of the need for a national .docx

  • 1. Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure: https://www.whitehouse.gov/presidential-actions/presidential- executive-order-strengthening-cybersecurity-federal-networks- critical-infrastructure/ After reading chapter 1 and looking at the link above, you're ready to participate in the first discussion. Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation. Around 300-400 words