Find an example of a business that had a failure in Information Governance
Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
1. Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure: https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/
After reading chapter 1 and looking at the link above look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber-attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation. – 1 page
2. Read chapters 2&3 and https://www.rebex.net/kb/secure-ftp/ (Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.)
In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet. It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats. – 1 page
Text book: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright © 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3)
3. Read chapter 1 – Information Governance failures have cost businesses and governments millions and billions of dollars. The course text provides the NSA & Edward Snowden along with Ford Motor Company as examples of what failing to implement a program that works correctly can result.
Find an example of a business that had a failure in Information Governance. Provide 2 page explaining the who, what, when, why and how of the failure. Include 3-5 citations in APA format.
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|