Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question: Security The Office of Cyber and Infrastructure Analysis (OCIA), a division of the U.S. Department of Homeland Security, strives to thwart and respond to physical or cyberthreats and hazards. Part of the office's role is to implement two policies: (1) Presidential Policy Directive 21 - Critical Infrastructure Security and Resilience, and (2) Executive Order 13636 - Improving Critical Infrastructure Cybersecurity. These two policies are designed to strengthen and secure the country's critical physical assets and services, such as air traffic control, natural gas supplies, water treatment, power plants, and finance, which are likely targets of cyberattacks. Federal agencies must comply with and routinely assess privacy standards and civil liberties protections. The government must share information regarding the cyberthreats, such as malicious code found on networks, but not contents of personal email messages. The private companies are urged to adopt the security incentives and increase their security ­systems, but participation is voluntary.

Research This: Locate Presidential Policy Directive 21 - Critical Infrastructure Security and Resilience and Executive Order 13636 - Improving Critical Infrastructure Cybersecurity and read their contents. Then, research news articles describing lawmakers' and businesses' support and criticism of these orders. What components are proposed to increase the nation's cybersecurity? What positions do the Internet Security Alliance and The Internet Association take on this matter? What efforts has Congress made to pass legislation addressing computer security?

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92492186
  • Price:- $15

Priced at Now at $15, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Refer to the cyclic redundancy check crc codes discussed in

Refer to the Cyclic Redundancy Check (CRC) codes discussed in the textbook and follow the conventions used in the textbook. Consider the 5-bit generator, G=10011, and suppose that D has the value 1010101011. What is the ...

There are sorted sequences l1 and l2 with 5 and 4 elements

There are sorted sequences L1 and L2, with 5 and 4 elements respectively. a) How many comparisons will it take to merge L1 and L2 in the best case? How many for worst case? Explain your answers. b) Let [54, 26, 93, 17, 7 ...

Suppose partition function of quicksort algorithm always

Suppose PARTITION function of QUICKSORT algorithm always produces 9 : 1 proportional split (i.e., after partition, one sub-array contains n/10 elements and the other sub-array contains 9n/10 elements). To take advantage ...

Question project 1 involves the creation of a personal

Question: Project 1 involves the creation of a personal website for yourself - also known as a resume site or a CV site. All the files used in the website must be contained within a specific folder named "project_1" (exc ...

Question the chief technology officer cto has indicated

Question: The Chief Technology Officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked fo ...

Discuss the importance of metadata and some of the various

Discuss the importance of metadata and some of the various ways (Microsoft) SQL Server allows you to expose that information. References welcomed to learn where to find obscure IT information (books, articles, websites)

Question a with respect to huffman coding devise a formula

Question : (a) With respect to Huffman Coding, devise a formula to compute the average compression based on the number of characters in a piece of text, n, and the number of unique characters in its alphabet, m. (b) Does ...

If sailsboro just paid a dividend of 2 per share amp

If Sailsboro just paid a dividend of $2 per share & dividends are expected to grow at 8%, 6%, and 5% for the next three years respectively. After that the dividends are expected to grow at a constant rate of 3% indefinit ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

A study sample was done regarding the association between

A study sample was done regarding the association between family history and the risk of developing AD. Exposure were family history of AD and no family history of AD. Outcomes were development of AD or no development of ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As