BSHS 482 MENTOR invent yourself/bshs482mentor.com - PowerPoint PPT Presentation

About This Presentation
Title:

BSHS 482 MENTOR invent yourself/bshs482mentor.com

Description:

FOR MORE CLASSES VISIT www.bss482mentor.com 1. What do the terms protection, mitigation, and recovery refer to? What types of actions constitute as protection, mitigation, and recovery? What are some examples of current events in which the local, state, or federal governments have implemented such actions? (Minimum of 125 words) 2. Select two types of infrastructure assets, such as a large dam and a major rail station. How do the asset protection techniques differ, and how are they similar? Remember to consider physical, cyber, and human risk considerations.(Minimum of 125 words) – PowerPoint PPT presentation

Number of Views:5
Slides: 14
Provided by: jyothi123456780101

less

Transcript and Presenter's Notes

Title: BSHS 482 MENTOR invent yourself/bshs482mentor.com


1
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
2
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Discussion Questions (5 DQs) FOR MORE
CLASSES VISIT www.bss482mentor.com What do the
terms protection, mitigation, and recovery refer
to? What types of actions constitute as
protection, mitigation, and recovery? What are
some examples of current events in which the
local, state, or federal governments have
implemented such actions? (Minimum of 125
words)     Select two types of infrastructure
assets, such as a large dam and a major rail
station. How do the asset protection techniques
differ, and how are they similar? Remember to
consider physical, cyber, and human risk
considerations.(Minimum of 125 words)
3
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Discussion Questions FOR MORE CLASSES
VISIT www.bss482mentor.com How can access to
cyber systems create an economic gain if not
detected? How does this situation differ from
disrupting a critical infrastructure system? What
are some other motives malicious actors may have
for accessing or disrupting a critical
infrastructure system? (Minimum of 250
words)     Why are humans considered a critical
infrastructure asset? What security practices
must be done to protect them from being
exploited? (Minimum of 250 words)
4
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 DQ threats to infrastructure assets FOR
MORE CLASSES VISIT www.bss482mentor.com What
types of threats do humans pose to infrastructure
assets? How have threats from malicious actors
evolved with technology advancements? What
physical techniques and cybertechniques do
terrorists and malicious actors use? Provide
examples. (Minimum of 200 words)
5
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Literature Review and Mitigating Risks
Annotated Bibliography FOR MORE CLASSES VISIT
www.bss482mentor.com Literature Review and
Mitigating Risks Annotated Bibliography Conduct a
literature review on security practices related
to human and property assets. Review two articles
from the reputable source and create separately
(Minimum of 85 words each) Also create a table to
accompany the annotated bibliography that
describes the pros and cons of each security
practice.
6
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Supervisory Control and Data
Acquisition FOR MORE CLASSES VISIT
www.bss482mentor.com What is Supervisory Control
and Data Acquisition (SCADA)? What are the
potential risks to SCADA by malicious actors? How
might organizations protect their control systems
from a compromise or an attack that affects
critical infrastructure?
7
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 US border entry points FOR MORE CLASSES
VISIT www.bss482mentor.com The following U.S.
border entry points New York via commercial
airplane Detroit via commercial transport truck
highway Vancouver to Seattle via intercity
passenger train Compare the security practices
used for the three modes of transportation. Create
a table that includes the following information
8
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Week 1 Sectors and Partnerships Paper FOR
MORE CLASSES VISIT www.bss482mentor.com Review th
e Sector Overviews and Partnerships sections
of the U.S. Department of Homeland
Securitys Critical Infrastructure Resource
Center. Select a critical infrastructure sector
that interests you and imagine that you are
working in a position in this sector. Write a
750- to 1050-word paper based on the job position
and critical infrastructure sector you
selected.  Answer the following questions in your
paper
9
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Week 2 Infrastructure Asset Protection
FOR MORE CLASSES VISIT www.bss482mentor.com Infr
astructure Asset Protection Explain Briefly
describe how computers and humans can pose risks
to infrastructure assets. Identify two physical
techniques and two cybertechniques used to attack
communications infrastructure. Explain the
implications of the risks and techniques on
critical infrastructure sectors. Describe how
humans and computers can protect against the
risks and techniques.
10
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Week 3 Attacks and Counterstrategy FOR
MORE CLASSES VISIT www.bss482mentor.com Part I
Role of the Malicious Actor Your supervisor asks
you to write a report in which you imagine that
you are a malicious actor interested in
exploiting or harming U.S. critical
infrastructure. Identify two critical
infrastructure sectors you will attack, your
motives for attacking and exploiting the sectors,
the sectors potential vulnerabilities, and the
approaches you will take to exploit the
vulnerabilities in the following table.
11
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Week 4 Critical Infrastructure and
National Planning FOR MORE CLASSES VISIT
www.bss482mentor.com Select a recent annual
plenary meeting report of the U.S. Department of
Homeland Securitys Critical Infrastructure
Partnership Advisory Council (CIPAC).
http//www.dhs.gov/critical-infrastructure-partner
ship-advisory-council  
12
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSS 482 Week 5 Border and Transportation
Security FOR MORE CLASSES VISIT
www.bss482mentor.com Write a 1,450- to
2,100-word research paper on border and
transportation security systems.  Include the
following in your paper An analysis of the
strengths and weaknesses in border and
transportation security. Include both physical
systems and cybersystems in your analysis. An
explanation of the best practices for improving
border and transportation security systems.
Include practices for both physical systems and
cybersystems. Provide examples and references to
support your research. Format your research paper
consistent with APA guidelines
13
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
BSHS 482 MENTOR INVENT Yourself/bshs482mentor.com
Write a Comment
User Comments (0)
About PowerShow.com