BSS 482 Your world/uophelp.com - PowerPoint PPT Presentation

About This Presentation
Title:

BSS 482 Your world/uophelp.com

Description:

For more course tutorials visit www.uophelp.com 1. What do the terms protection, mitigation, and recovery refer to? What types of actions constitute as protection, mitigation, and recovery? What are some examples of current events in which the local, state, or federal governments have implemented such actio – PowerPoint PPT presentation

Number of Views:3
Slides: 14
Provided by: bluebell516

less

Transcript and Presenter's Notes

Title: BSS 482 Your world/uophelp.com


1
BSS 482 Your world/uophelp.com
  • For more course tutorials visit
  • www.uophelp.com

2
BSS 482 Discussion Questions (5 DQs)
  • For more course tutorials visit www.uophelp.com
  • 1. What do the terms protection, mitigation, and
    recovery refer to? What types of actions
    constitute as protection, mitigation, and
    recovery? What are some examples of current
    events in which the local, state, or federal
    governments have impl

3
BSS 482 Discussion Questions
  • For more course tutorials visit www.uophelp.com
  • How can access to cyber systems create an
    economic gain if not detected? How does this
    situation differ from disrupting a critical
    infrastructure system? What are some other
    motives malicious actors may have for accessing
    or disrupting

4
BSS 482 DQ threats to infrastructure assets
  • For more course tutorials visit www.uophelp.com
  • What types of threats do humans pose to
    infrastructure assets? How have threats from
    malicious actors evolved with technology
    advancements? What physical techniques and
    cybertechniques do terrorists and malicious
    actors use? Provide examples. (Mini

5
BSS 482 Literature Review and Mitigating Risks
Annotated Bibliography
  • For more course tutorials visit www.uophelp.com
  • Literature Review and Mitigating Risks Annotated
    Bibliography
  • Conduct a literature review on security practices
    related to human and property assets. Review two
    articles from the reputable source and create
    separately (Minimum of 85 words each)
  • Also create a table to accompany the annotated
    bibliography t

6
BSS 482 Supervisory Control and Data Acquisition
  • For more course tutorials visit www.uophelp.com
  • What is Supervisory Control and Data Acquisition
    (SCADA)? What are the potential risks to SCADA by
    malicious actors? How might organizations protect
    their control systems from a compromise or an
    attack that affects critical infrastructure?

7
BSS 482 U.S. border entry points
  • For more course tutorials visit www.uophelp.com
  • The following U.S. border entry points
  • New York via commercial airplane
  • Detroit via commercial transport truck
    highway
  • Vancouver to Seattle via intercity
    passenger train
  • Compare the security practices used for the three
    modes

8
BSS 482 Week 1 Sectors Partnerships Paper
  • For more course tutorials visit www.uophelp.com
  • Review the Sector Overviews and Partnerships
    sections of the U.S. Department of Homeland
    Securitys Critical Infrastructure Resource
    Center.
  • Select a critical infrastructure sector that
    interests you and imagine that you are working in
    a position in this sector.
  • Write a 750- to 1050-word paper based on the job
    positi

9
BSS 482 Week 2 Infrastructure Asset Protection
  • For more course tutorials visit www.uophelp.com
  • Infrastructure Asset Protection
  • Explain Briefly describe how computers
    and humans can pose risks to infrastructure
    assets.
  • Identify two physical techniques and
    two cybertechniques used to attack communications
    infrastructure.
  • Explain the implications of the risks
    and techniques on critical infrastructure
    sectors.
  • Describe how humans and computers can
    protect

10
BSS 482 Week 3 Attacks and Counterstrategy
  • For more course tutorials visit www.uophelp.com
  • Part I Role of the Malicious Actor
  • Your supervisor asks you to write a report in
    which you imagine that you are a malicious actor
    interested in exploiting or harming U.S. critical
    infrastructure.
  • Identify two critical infrastructure sectors you
    will attack, your motives for attacking and
    exploiting the sectors, the sectors potential
    vulnerabilities, and the approaches yo

11
BSS 482 Week 4 Critical Infrastructure and
National Planning
  • For more course tutorials visit www.uophelp.com
  • Select a recent annual plenary meeting report of
    the U.S. Department of Homeland Securitys
    Critical Infrastructure Partnership Advisory
    Council (CIPAC). http//www.dhs.gov/critical-infra
    structure-partnership-advisory-council

12
BSS 482 Week 5 Border and Transportation
Security
  • For more course tutorials visit www.uophelp.com
  • Write a 1,450- to 2,100-word research paper on
    border and transportation security systems.
  • Include the following in your paper
  • An analysis of the strengths and weaknesses in
    border and transportation security. Include both
    physical systems and cybersystems in your
    analysis.
  • An explanation of the best practices for
    improving border and transportation

13
BSS 482 Your world/uophelp.com
  • For more course tutorials visit
  • www.uophelp.com
Write a Comment
User Comments (0)
About PowerShow.com