6 discussion responses 
 In Responses need to follow this pattern
What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?Discussion 1:
Critical national infrastructure is essential for organizations, and even some government sectors
are using it to provide services for the public. Large scale organizations and commercial enterprises
like service providers, use complex support systems. The services provided by the framework
include the emergency services to entertainment services. Some of them are customer
entertainment, support for the military services, SCADA systems. The internet service providers,
financial services like banks, insurance also come under this (Amoroso, 2013).
There are many cons to this infrastructure as it is more prone to physical attacks in the
United States. The attacks include tampering of the equipment and cable cuts. The cyber attacks
are increased on the infrastructure with the introduction of computers, the internet, and software.
There is a need to implement critical security measures to protect the infrastructure form the
attacks. The scenario is about a cyber attack on the infrastructure where the attackers entered the
system and paralyzed most of the services (Amoroso, 2013).
DHS must protect the national infrastructure by implementing all the security measures
like software updates and anti-malware up to date. The infrastructure needs strong firewall
protection like a stateful firewall rather than the normal one, and intrusion detection systems will
help to identify the virus entered the system. Using multi-level authentication before allowing the
person to access the network and user education about the phishing attacks will protect the
network. The techniques like encryption will encode the data and toughen the network for the
attackers to decode it (Amoroso, 2013).
After the attack, the DHS must react as soon as possible to reduce the effects of the attack
and prevent them from extending the damage. They need to find out the starting point of the attack
and how the inducers able to make the attack (West, 2016). The DHS must check the entire
network for the affected areas and take appropriate measures to remove all the viruses from the
system. They need to intimate the people about the attack and create awareness among them.
They need to check all the vulnerabilities, if any, in the network and rectify them, and they
have to disconnect the affected network and stop the remotely connected systems. DHS people
must change the passwords and increase the password strength, and check the authentication of
the network and who is accessing the system. After identifying the vulnerabilities, deploy security
measures in the software and hardware of the network and use defense-in-depth, which provides
multi-layer security (West, 2016).
Discussion 2:
In an incident where the United States suffers a massive cyber-attack, the department of homeland
security has a role of responding to the attack to restore the affected significant government
functions. The department has the responsibility of mobilizing the attack response team to facilitate
the prevention of more damage by the attack. The response team, which requires the least time to
form, will involve the shareholder parties in the government and a highly trained expert group to
examine how the breach occurred. Also, a human resource representative for scenarios where
employees suffer the attack, intellectual experts to assist in the recovery of sensitive government
information and information experts who will ensure data is highly protected. The department has
to involve legal agencies and alert them of the attack to help in creating awareness of the legal
impacts of a cyber-attack. The team needs to include a representative of the department of defense
forces to aid in providing crucial information regarding the effects of the attack and possible
remedies that can mitigate the situation.
The homeland security team will ensure the technical personnel secures the government
systems to ensure the security breach is contained and the hacking of the essential operations is
not ongoing. It will alert the department of defense to suspend some of its services or halt the entire
activities that may compromise the security of the department. The technical team will have to
identify the time of launching the attack and whether they can detect any possible signals of data
intrusion. It is vital to employ an investigation team that will aid in establishing how the attack is
implemented and whether there is an inside job from the government employees who could have
played a role in facilitating China to paralyze the government operations. The department will then
report back to the relevant authority of its findings and its counter-actions towards the situation
(Rossi, 2015).
Discussion 3:
The United States will be majorly hit by a coordinated attack that might paralyze the normal
operations of its critical infrastructure. The commercial ventures, along with the government
agencies, would be severely hit, and the basic IT infrastructure of the firm shall be affected. The
issue is severe as the attacks would be organized by China, one of the technologically advanced
and powerful nations. The attacks have a direct impact on the satellite communications of the
nation, and it will limit the DOD’s communication with agencies located overseas.
The vital mission of DHS is to safeguard the Americans and secure the nation from constant
threats by strengthening cybersecurity and responding to emergencies within the stipulated time.
It is one of the federal agencies of the United States, and apart from border control, aviation
security, and emergency response, it can play a vital role in preventing constant threats from China
as well. Therefore, in order to deal with a probable attack, following steps can be taken.
The secretary of DHS can collaborate with the OMB Director and can assess the risks of
each agency. It is outlined in the Presidential Order that DHS can act in accordance with chapter
35 and subchapter II, title 4, U.S Code. After identifying the risks, they can work towards
mitigation strategies (Powner, 2005). The risk assessment process is followed by the provision of
technical assistance, and the assessment should be conducted before and after the incident. The
department is supposed to share information with various entities, and it can act in accordance
with “Homeland Security Act, 2002 (Bullock, Haddow & Coppola, 2002).”
The investigation is part of the process, and DHS can investigate the ICT enabled crimes
and the harm to intellectual theft, financial theft, and property theft. Apart from sharing
information with federal agencies, DHS can also share information with the non-federal agencies,
including the private sector and state governments. The type of information can be classified from
an industry partner, or it can be an unclassified form of information as well. One of the goals of
the DHS is to disrupt and prevent the increasing number of criminals from the usage of cyberspace.
There has been a tremendous increase of sophisticated criminals in the cyber space, and the
department can take active steps in enhancing its knowledge regarding computer forensics, cyber
tradecraft, and digital investigations.
The cybersecurity activities can be improved and managed only if the DHS starts
integrating useful cybersecurity policy with other planning activities. In order to ensure
consistency, the DHS needs to establish a range of internal mechanisms (Getha-Taylor, 2008).
Therefore, it can be concluded that the DHS needs to prioritize various cybersecurity programs
and identify gaps in the existing strategies so that it can achieve its cybersecurity objectives and
goals. Apart from information sharing, the situation can be tackled by responding to the attacks on
time. Cyberspace is one of the vulnerable areas that require immediate safeguarding.
Discussion 4:
DHS’s role in strengthening the security of the United States against cyber-threats
The anticipated cyber-attacks from China in the United States have become a significant
concern. Sudden malicious attacks can weaken the nation’s critical infrastructure, and by 2020,
there would be a rise in criminal activities. In case the electric grid of the country shuts down, it
can have a severe impact on the communication channels. Firstly, the DOD or the Department of
Defense would lose its ability to maintain its communication. Secondly, the anticipated attacks
will hit the financial as well as commercial institutions operating in the U.S. The DHS can take
active steps to assess the situation and prevent the risks.
A brief overview of the responsibilities of DHS
One of the government structures of the United States is the DHS. It can act as a threat
actor and prevent cyber-related threats and accomplish various security missions. The structure
has been established for the welfare of the U.S citizens. The different types of missions of the DHS
include information sharing, protection of critical infrastructure, customs and immigration
enforcement, the security of the transportation agency, and management of the federal emergency
(Coldebella & White, 2010). Again, law enforcement is another functional area of the department.
The DHS works in collaboration with federal agencies of the government. It is supposed to
maintain agreements and work in collaboration with DOE and the NIST. The purpose is to ensure
best practices in cybersecurity. Again, it also collaborates with the private sector and acts in
accordance with the Cybersecurity Act 2015. It ensures that both the federal agencies and the
private sector get informed about the probable incidents without delay.
Identified action areas
In order to handle the upcoming cyber-related threats, the president has already established
the presidential order. It outlines the ways in which cyber-threats can be handled. The DHS has
the responsibility of participating actively in the process and collaborating with the federal and
private agencies. The areas of actions have been outlined belowAssessment of the evolving risks- Risks can be assessed by addressing the existing gaps in disaster
preparedness. It would be possible to predict the upcoming or future risks as well. The department
can focus on sector-specific agencies, including the General Services Administration and the
Department of Defense (Hare, 2009).
Ensuring the protection of the information systems of the federal government- The OMB or the
Office of Management and Budget can help DHS in reducing organizational vulnerabilities and
protecting the IS by continuing a close collaboration.
Focusing on mitigating the cyber incidents- The coordinated attacks from China can directly affect
the critical assets of the nation. Cyber incidents can be mitigated by focusing on the investigation
(Von Solms & Van Niekerk, 2013). It would be vital to use both the DHS as well as the non-DHS
resources for continuing the investigation process.
Strengthening the reliability and security of ecosystems- In this case, the ecosystem refers to
interdependent components of the infrastructure such as environment, people, and conditions and,
most importantly, the norms. The expansion of cyber training programs would be effective as well.
Discussion 5:
United States Federal cyber-attack policies
Cyber-attacks are a form of cybercrime, at which point an external attacker attacks a computer
system intending to steal, destroy, gain access, or compromise a computer system or a network of
multiple computers. These attacks are often backed by the intention of stealing important data or
to compromise the computer systems.
Federal network policies for cybersecurity
The federal executive branch operates Information Technology (IT) practices on behalf of the
American citizens. The data secured inside its systems should be secured using all the resources
of the United States. In case of any data breach, the secretary of homeland security in coordination
with the director of Federal Bureau of Investigation (FBI), director of national intelligence, and all
other appropriate agency heads, shall identify the authorities and capabilities, that can be employed
to assist the cybersecurity attempts to thwart the attacks, evaluate the security measures
undertaken, and provide a detailed report to the president, which can be classified partly or fully.
Within two hundred and forty days of issuing this order, the secretary of homeland defense should
issue a preliminary report stating these efforts made by the department towards eliminating the
effects of the attack, which should be made publicly available. Within one year, the secretary shall
submit a detailed report to the president (Order, 2017).
Handling the given cyber-attack situation
In the given situation, the DHS needs to handle the situation from various tiers and through various
dimensions (White, 2017). The legalities of the procedure should be followed up only after
resolution against any possible suspected parties are attained. Suitable responses should be
adopted, and more efficient security measures should be enforced. The DHS should be focused on
solving the situation with appropriate response processes. The possible suspected networks must
be isolated from others, and an attempt must be made to find out the source of the attack. This
applies to both public and federal networks.
In the given case, a large scale cyber-attack is perpetrated by a foreign country. For this,
system threats should be removed by hiring adequately trained professionals (Torten, Reaiche &
Boyle, 2018). It can be done under the authority of the secretary of defense and head of DHS. Also,
the system should be scanned regularly, and networks should be monitored remotely to avoid such
incidences in the future. Checks should be conducted in other departments as well, to ensure that
they have implemented the necessary protocols. For the future, threat monitoring teams should be
set up and trained appropriately so that any future instances can be avoided. If not, the firms should
be instructed to adopt necessary safety protocols.
Different firms and organizations may have a different set of cyber protection laws, which
might not be sufficient. To eliminate these problems, national-level cybersecurity standards must
be implemented so that the isolated failures (and the security bottlenecks that come with it) can be
avoided or, at the very least, can be minimized. Users all over the country should be made aware
of these external threats by the federal departments by the use of publicly accessible domains such
as official websites and information brochures.
Discussion 6:
DHS protects and advances national and homeland security as part of the U.S. Government’s goal
to provide government, business, and individuals with assurance against extreme and unusual
threat conditions. DHS is to lead a collaboration among cybersecurity experts and industry to
quickly identify threats and develop technologies to effectively protect U.S. systems and critical
infrastructure from harm (Lewis, 2020). Department of Homeland Security (DHS) has a cyber
threat capacity that is among the strongest in the government and society, with a primary focus on
preventing, disrupting, and degrading these threats. DHS continues to perform a wide range of
cyber exercises to test its ability to respond to cybersecurity threats and assess its ability to respond
to an emergency or catastrophic incident that impact critical infrastructure (Lewis, 2020).
Additionally, DHS continuously works with industry, academia, and the general public to foster
cooperation in order to address cybersecurity threats. DHS strives to support effective operations
and programs that provide direction and guidance to prevent, detect, and mitigate cyber risk to the
nation’s infrastructure and critical systems. DHS gathers and analyzes a wide range of information,
including what makes these threats unique to the United States and the urgent nature of the cyber
threats, conducts targeted investigations and rigorous analysis to improve its understanding of key
indicators and cyber threats; works closely with the private sector to achieve effective, efficient
cyber protection and protect the public’s privacy, and supports cross-sector work to strengthen
international collaboration and address growing cross-border threats (George, 2020).
DHS Executive order will lead to the development of standard guidelines and guidelines
for critical infrastructure and its cybersecurity. They are grateful for this working relationship that
allows the critical infrastructure community to realize the benefits of sharing best practices. DHS
is currently working with its Critical Infrastructure Partners to understand better what they are
doing, to share best practices, and to ensure they have the right tools, as well as the expertise to
make informed decisions (Lewis, 2020). DHS takes a risk-based approach to protect critical
infrastructure, and its actions are designed to protect the homeland and the U.S. from cyberattacks
and intrusions to these systems. U.S. intelligence officials said. The attacks may be of increasing
complexity, in particular by combining hacking capabilities of different organizations and
engaging with individual citizens in the network. They will likely happen during peak hours, as
people wake up in the morning, check their emails, and surf the Internet (George, 2020).
Instructions:

Need 150 words for each response (Total 6 responses 900 words)

No References Needed

In Responses need to follow this pattern
o What did you learn from your classmate’s posting?
o What additional questions do you have after reading the posting?
o What clarification do you need regarding the posting?
o What differences or similarities do you see between your posting and other
classmates’ postings?
Discussion 1:
Critical national infrastructure is essential for organizations, and even some government sectors
are using it to provide services for the public. Large scale organizations and commercial enterprises
like service providers, use complex support systems. The services provided by the framework
include the emergency services to entertainment services. Some of them are customer
entertainment, support for the military services, SCADA systems. The internet service providers,
financial services like banks, insurance also come under this (Amoroso, 2013).
There are many cons to this infrastructure as it is more prone to physical attacks in the
United States. The attacks include tampering of the equipment and cable cuts. The cyber-attacks
are increased on the infrastructure with the introduction of computers, the internet, and software.
There is a need to implement critical security measures to protect the infrastructure form the
attacks. The scenario is about a cyber-attack on the infrastructure where the attackers entered the
system and paralyzed most of the services (Amoroso, 2013).
DHS must protect the national infrastructure by implementing all the security measures
like software updates and anti-malware up to date. The infrastructure needs strong firewall
protection like a stateful firewall rather than the normal one, and intrusion detection systems will
help to identify the virus entered the system. Using multi-level authentication before allowing the
person to access the network and user education about the phishing attacks will protect the
network. The techniques like encryption will encode the data and toughen the network for the
attackers to decode it (Amoroso, 2013).
After the attack, the DHS must react as soon as possible to reduce the effects of the attack
and prevent them from extending the damage. They need to find out the starting point of the attack
and how the inducers able to make the attack (West, 2016). The DHS must check the entire
network for the affected areas and take appropriate measures to remove all the viruses from the
system. They need to intimate the people about the attack and create awareness among them.
They need to check all the vulnerabilities, if any, in the network and rectify them, and they
have to disconnect the affected network and stop the remotely connected systems. DHS people
must change the passwords and increase the password strength and check the authentication of the
network and who is accessing the system. After identifying the vulnerabilities, deploy security
measures in the software and hardware of the network and use defense-in-depth, which provides
multi-layer security (West, 2016).
Discussion 2:
In an incident where the United States suffers a massive cyber-attack, the department of homeland
security has a role of responding to the attack to restore the affected significant government
functions. The department has the responsibility of mobilizing the attack response team to facilitate
the prevention of more damage by the attack. The response team, which requires the least time to
form, will involve the shareholder parties in the government and a highly trained expert group to
examine how the breach occurred. Also, a human resource representative for scenarios where
employees suffer the attack, intellectual experts to assist in the recovery of sensitive government
information and information experts who will ensure data is highly protected. The department has
to involve legal agencies and alert them of the attack to help in creating awareness of the legal
impacts of a cyber-attack. The team needs to include a representative of the department of defense
forces to aid in providing crucial information regarding the effects of the attack and possible
remedies that can mitigate the situation.
The homeland security team will ensure the technical personnel secures the government
systems to ensure the security breach is contained and the hacking of the essential operations is
not ongoing. It will alert the department of defense to suspend some of its services or halt the entire
activities that may compromise the security of the department. The technical team will have to
identify the time of launching the attack and whether they can detect any possible signals of data
intrusion. It is vital to employ an investigation team that will aid in establishing how the attack is
implemented and whether there is an inside job from the government employees who could have
played a role in facilitating China to paralyze the government operations. The department will then
report back to the relevant authority of its findings and its counteractions towards the situation
(Rossi, 2015).
Discussion 3:
The United States will be majorly hit by a coordinated attack that might paralyze the normal
operations of its critical infrastructure. The commercial ventures, along with the government
agencies, would be severely hit, and the basic IT infrastructure of the firm shall be affected. The
issue is severe as the attacks would be organized by China, one of the technologically advanced
and powerful nations. The attacks have a direct impact on the satellite communications of the
nation, and it will limit the DOD’s communication with agencies located overseas.
The vital mission of DHS is to safeguard the Americans and secure the nation from constant
threats by strengthening cybersecurity and responding to emergencies within the stipulated time.
It is one of the federal agencies of the United States, and apart from border control, aviation
security, and emergency response, it can play a vital role in preventing constant threats from China
as well. Therefore, in order to deal with a probable attack, following steps can be taken.
The secretary of DHS can collaborate with the OMB Director and can assess the risks of
each agency. It is outlined in the Presidential Order that DHS can act in accordance with chapter
35 and subchapter II, title 4, U.S Code. After identifying the risks, they can work towards
mitigation strategies (Powner, 2005). The risk assessment process is followed by the provision of
technical assistance, and the assessment should be conducted before and after the incident. The
department is supposed to share information with various entities, and it can act in accordance
with “Homeland Security Act, 2002 (Bullock, Haddow & Coppola, 2002).”
The investigation is part of the process, and DHS can investigate the ICT enabled crimes
and the harm to intellectual theft, financial theft, and property theft. Apart from sharing
information with federal agencies, DHS can also share information with the non-federal agencies,
including the private sector and state governments. The type of information can be classified from
an industry partner, or it can be an unclassified form of information as well. One of the goals of
the DHS is to disrupt and prevent the increasing number of criminals from the usage of cyberspace.
There has been a tremendous increase of sophisticated criminals in the cyber space, and the
department can take active steps in enhancing its knowledge regarding computer forensics, cyber
tradecraft, and digital investigations.
The cybersecurity activities can be improved and managed only if the DHS starts
integrating useful cybersecurity policy with other planning activities. In order to ensure
consistency, the DHS needs to establish a range of internal mechanisms (Getha-Taylor, 2008).
Therefore, it can be concluded that the DHS needs to prioritize various cybersecurity programs
and identify gaps in the existing strategies so that it can achieve its cybersecurity objectives and
goals. Apart from information sharing, the situation can be tackled by responding to the attacks on
time. Cyberspace is one of the vulnerable areas that require immediate safeguarding.
Discussion 4:
DHS’s role in strengthening the security of the United States against cyber-threats
The anticipated cyber-attacks from China in the United States have become a significant
concern. Sudden malicious attacks can weaken the nation’s critical infrastructure, and by 2020,
there would be a rise in criminal activities. In case the electric grid of the country shuts down, it
can have a severe impact on the communication channels. Firstly, the DOD or the Department of
Defense would lose its ability to maintain its communication. Secondly, the anticipated attacks
will hit the financial as well as commercial institutions operating in the U.S. The DHS can take
active steps to assess the situation and prevent the risks.
A brief overview of the responsibilities of DHS
One of the government structures of the United States is the DHS. It can act as a threat
actor and prevent cyber-related threats and accomplish various security missions. The structure
has been established for the welfare of the U.S citizens. The different types of missions of the DHS
include information sharing, protection of critical infrastructure, customs and immigration
enforcement, the security of the transportation agency, and management of the federal emergency
(Coldebella & White, 2010). Again, law enforcement is another functional area of the department.
The DHS works in collaboration with federal agencies of the government. It is supposed to
maintain agreements and work in collaboration with DOE and the NIST. The purpose is to ensure
best practices in cybersecurity. Again, it also collaborates with the private sector and acts in
accordance with the Cybersecurity Act 2015. It ensures that both the federal agencies and the
private sector get informed about the probable incidents without delay.
Identified action areas
In order to handle the upcoming cyber-related threats, the president has already established
the presidential order. It outlines the ways in which cyber-threats can be handled. The DHS has
the responsibility of participating actively in the process and collaborating with the federal and
private agencies. The areas of actions have been outlined belowAssessment of the evolving risks- Risks can be assessed by addressing the existing gaps in disaster
preparedness. It would be possible to predict the upcoming or future risks as well. The department
can focus on sector-specific agencies, including the General Services Administration and the
Department of Defense (Hare, 2009).
Ensuring the protection of the information systems of the federal government- The OMB or the
Office of Management and Budget can help DHS in reducing organizational vulnerabilities and
protecting the IS by continuing a close collaboration.
Focusing on mitigating the cyber incidents- The coordinated attacks from China can directly affect
the critical assets of the nation. Cyber incidents can be mitigated by focusing on the investigation
(Von Solms & Van Niekerk, 2013). It would be vital to use both the DHS as well as the non-DHS
resources for continuing the investigation process.
Strengthening the reliability and security of ecosystems- In this case, the ecosystem refers to
interdependent components of the infrastructure such as environment, people, and conditions and,
most importantly, the norms. The expansion of cyber training programs would be effective as well.
Discussion 5:
United States Federal cyber-attack policies
Cyber-attacks are a form of cybercrime, at which point an external attacker attacks a computer
system intending to steal, destroy, gain access, or compromise a computer system or a network of
multiple computers. These attacks are often backed by the intention of stealing important data or
to compromise the computer systems.
Federal network policies for cybersecurity
The federal executive branch operates Information Technology (IT) practices on behalf of the
American citizens. The data secured inside its systems should be secured using all the resources
of the United States. In case of any data breach, the secretary of homeland security in coordination
with the director of Federal Bureau of Investigation (FBI), director of national intelligence, and all
other appropriate agency heads, shall identify the authorities and capabilities, that can be employed
to assist the cybersecurity attempts to thwart the attacks, evaluate the security measures
undertaken, and provide a detailed report to the president, which can be classified partly or fully.
Within two hundred and forty days of issuing this order, the secretary of homeland defense should
issue a preliminary report stating these efforts made by the department towards eliminating the
effects of the attack, which should be made publicly available. Within one year, the secretary shall
submit a detailed report to the president (Order, 2017).
Handling the given cyber-attack situation
In the given situation, the DHS needs to handle the situation from various tiers and through various
dimensions (White, 2017). The legalities of the procedure should be followed up only after
resolution against any possible suspected parties are attained. Suitable responses should be
adopted, and more efficient security measures should be enforced. The DHS should be focused on
solving the situation with appropriate response processes. The possible suspected networks must
be isolated from others, and an attempt must be made to find out the source of the attack. This
applies to both public and federal networks.
In the given case, a large-scale cyber-attack is perpetrated by a foreign country. For this,
system threats should be removed by hiring adequately trained professionals (Torten, Reaiche &
Boyle, 2018). It can be done under the authority of the secretary of defense and head of DHS. Also,
the system should be scanned regularly, and networks should be monitored remotely to avoid such
incidences in the future. Checks should be conducted in other departments as well, to ensure that
they have implemented the necessary protocols. For the future, threat monitoring teams should be
set up and trained appropriately so that any future instances can be avoided. If not, the firms should
be instructed to adopt necessary safety protocols.
Different firms and organizations may have a different set of cyber protection laws, which
might not be sufficient. To eliminate these problems, national-level cybersecurity standards must
be implemented so that the isolated failures (and the security bottlenecks that come with it) can be
avoided or, at the very least, can be minimized. Users all over the country should be made aware
of these external threats by the federal departments by the use of publicly accessible domains such
as official websites and information brochures.
Discussion 6:
DHS protects and advances national and homeland security as part of the U.S. Government’s goal
to provide government, business, and individuals with assurance against extreme and unusual
threat conditions. DHS is to lead a collaboration among cybersecurity experts and industry to
quickly identify threats and develop technologies to effectively protect U.S. systems and critical
infrastructure from harm (Lewis, 2020). Department of Homeland Security (DHS) has a cyber
threat capacity that is among the strongest in the government and society, with a primary focus on
preventing, disrupting, and degrading these threats. DHS continues to perform a wide range of
cyber exercises to test its ability to respond to cybersecurity threats and assess its ability to respond
to an emergency or catastrophic incident that impact critical infrastructure (Lewis, 2020).
Additionally, DHS continuously works with industry, academia, and the general public to foster
cooperation in order to address cybersecurity threats. DHS strives to support effective operations
and programs that provide direction and guidance to prevent, detect, and mitigate cyber risk to the
nation’s infrastructure and critical systems. DHS gathers and analyzes a wide range of information,
including what makes these threats unique to the United States and the urgent nature of the cyber
threats, conducts targeted investigations and rigorous analysis to improve its understanding of key
indicators and cyber threats; works closely with the private sector to achieve effective, efficient
cyber protection and protect the public’s privacy, and supports cross-sector work to strengthen
international collaboration and address growing cross-border threats (George, 2020).
DHS Executive order will lead to the development of standard guidelines and guidelines
for critical infrastructure and its cybersecurity. They are grateful for this working relationship that
allows the critical infrastructure community to realize the benefits of sharing best practices. DHS
is currently working with its Critical Infrastructure Partners to understand better what they are
doing, to share best practices, and to ensure they have the right tools, as well as the expertise to
make informed decisions (Lewis, 2020). DHS takes a risk-based approach to protect critical
infrastructure, and its actions are designed to protect the homeland and the U.S. from cyberattacks
and intrusions to these systems. U.S. intelligence officials said. The attacks may be of increasing
complexity, in particular by combining hacking capabilities of different organizations and
engaging with individual citizens in the network. They will likely happen during peak hours, as
people wake up in the morning, check their emails, and surf the Internet (George, 2020).
Instructions:

Need 150 words for each response (Total 6 responses 900 words)

No References Needed

In Responses need to follow this pattern
o What did you learn from your classmate’s posting?
o What additional questions do you have after reading the posting?
o What clarification do you need regarding the posting?
o What differences or similarities do you see between your posting and other
classmates’ postings?

Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.