Title: BSS 482 Course Success is a Tradition - snaptutorial.com
1BSS 482 Course Success is a Tradition /
snaptutorial.com
The Best way to predict the Future is to create
it.....To Best way....
www.snaptutorial.com
2BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Discussion Questions (5 DQs) 1. What do
the terms protection, mitigation, and recovery
refer to? What types of actions constitute as
protection, mitigation, and recovery? What are
some examples of current events in which the
local, state, or federal governments have
implemented such actions? (Minimum of 125 words)
2. Select two types of infrastructure assets,
such as a large dam and a major rail station. How
do the asset protection techniques differ, and
how are they similar? Remember to consider
physical, cyber, and human risk
considerations.(Minimum of 125 words)
3BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Discussion Questions How can access to
cyber systems create an economic gain if not
detected? How does this situation differ from
disrupting a critical infrastructure system? What
are some other motives malicious actors may have
for accessing or disrupting a critical
infrastructure system? (Minimum of 250 words)
Why are humans considered a critical
infrastructure asset? What security practices
must be done to protect them from being
exploited? (Minimum of 250 words)
4BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 DQ threats to infrastructure
assets What types of threats do humans pose to
infrastructure assets? How have threats from
malicious actors evolved with technology
advancements? What physical techniques and
cybertechniques do terrorists and malicious
actors use? Provide examples. (Minimum of 200
words)
5BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Literature Review and Mitigating Risks
Annotated Bibliography Literature Review and
Mitigating Risks Annotated Bibliography Conduct a
literature review on security practices related
to human and property assets. Review two articles
from the reputable source and create separately
(Minimum of 85 words each) Also create a table to
accompany the annotated bibliography that
describes the pros and cons of each security
practice.
6BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Supervisory Control and Data
Acquisition What is Supervisory Control and
Data Acquisition (SCADA)? What are the potential
risks to SCADA by malicious actors? How might
organizations protect their control systems from
a compromise or an attack that affects critical
infrastructure?
7BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 U.S. border entry points The following
U.S. border entry points New York via
commercial airplane Detroit via
commercial transport truck highway
Vancouver to Seattle via intercity passenger
train Compare the security practices used for the
three modes of transportation. Create a table
that includes the following information
8BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Week 1 Sectors Partnerships
Paper Review the Sector Overviews and
Partnerships sections of the U.S. Department of
Homeland Securitys Critical Infrastructure
Resource Center. Select a critical infrastructure
sector that interests you and imagine that you
are working in a position in this sector. Write a
750- to 1050-word paper based on the job position
and critical infrastructure sector you selected.
Answer the following questions in your paper
9BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Week 2 Infrastructure Asset
Protection Infrastructure Asset Protection
Explain Briefly describe how computers and
humans can pose risks to infrastructure assets.
Identify two physical techniques and two
cybertechniques used to attack communications
infrastructure. Explain the
implications of the risks and techniques on
critical infrastructure sectors.
Describe how humans and computers can protect
against the risks and techniques. (Minimum of 550
words)
10BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Week 3 Attacks and Counterstrategy Part
I Role of the Malicious Actor Your supervisor
asks you to write a report in which you imagine
that you are a malicious actor interested in
exploiting or harming U.S. critical
infrastructure. Identify two critical
infrastructure sectors you will attack, your
motives for attacking and exploiting the sectors,
the sectors potential vulnerabilities, and the
approaches you will take to exploit the
vulnerabilities in the following table.
11BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Week 4 Critical Infrastructure and
National Planning Select a recent annual
plenary meeting report of the U.S. Department of
Homeland Securitys Critical Infrastructure
Partnership Advisory Council (CIPAC).
http//www.dhs.gov/critical-infrastructure-partner
ship-advisory-council Write a 700- to
1050-word paper based on the selected CIPAC
annual plenary meeting report. ? Include the
following in your paper
12BSS 482 Course Success is a Tradition /
snaptutorial.com
BSS 482 Week 5 Border and Transportation
Security Write a 1,450- to 2,100-word research
paper on border and transportation security
systems. Include the following in your paper An
analysis of the strengths and weaknesses in
border and transportation security. Include both
physical systems and cybersystems in your
analysis. An explanation of the best practices
for improving border and transportation security
systems. Include practices for both physical
systems and cybersystems.
13BSS 482 Course Success is a Tradition /
snaptutorial.com
The Best way to predict the Future is to create
it.....To Best way....
www.snaptutorial.com