Question

In: Nursing

When answering the following questions, explain the relationship to critical infrastructure protection. Define each of the...

  • When answering the following questions, explain the relationship to critical infrastructure protection.

  • Define each of the following related to information sharing: Need to Know, Sensitive But Unclassified (SBU) safeguards, For Official Use Only (FOUO), Critical Infrastructure Information (CII), Open-source information and intelligence, Clouds and concealed conduits, Freedom of Information Act (FOIA) exemptions, Enforcement of Section 214 of the Homeland Security Act.

Solutions

Expert Solution

Sensitive But Unclassified(SBU) designated when information not classified but need to be protected or safeguards. SBU information need restriction on access and disclosure has rules for access and risk in unauthorized disclosure.
For Office Use Only(FOUO): it is a document designated not under classification. this document used only by department of laws and other federal agencies for information gathering. It is although unclassified may not disclose the information to the public. Department of homeland security policy safeguards this FOUO but unclassified information within DHS received information from government and non-government activities.
Critical infrastructure information(CII) that information not customized in public use. it is a secured and critical infrastructure information protection system. Critical infrastructure information Act facilitates greater sharing of CII among owners and government entities with infrastructure protected responsibility, it reduce public vulnerability to risk and ensures security and safety.
Open-source information and intelligence: it has data and information available to the public. open-source intelligence produced for publicly available information and provides a specific intelligence requirement. it can available in webpages other sources of open source information like google we can freely access information online using a major search engine. security professionals use open source intelligence to identify potential weaknesses in a friendly network. intelligence from the open-source often used with combination of internal telemetry and external intelligence for sharing information commonly.


Related Solutions

When answering the following questions, explain the relationship to critical infrastructure protection. Describe five of the...
When answering the following questions, explain the relationship to critical infrastructure protection. Describe five of the 11 transportation infrastructure in terms of risk and protection - roads, railways, walkways, bridges and tunnels, stations, airports, air routes, waterways, ports, cycling infrastructure, and living streets.
Explain Critical infrastructure vulnerability analysis its relationship to critical infrastructure protection:
Explain Critical infrastructure vulnerability analysis its relationship to critical infrastructure protection:
Explain Risk management and risk analysis and their relationship to critical infrastructure protection.
Explain Risk management and risk analysis and their relationship to critical infrastructure protection.
Explain Vulnerability reduction versus financial risk reduction and their relationship to critical infrastructure protection:
Explain Vulnerability reduction versus financial risk reduction and their relationship to critical infrastructure protection:
1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3...
1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3 examples. 2. In your own words, define critical infrastructure assessment (CIA) and the goals associated with CIA. Provide 3 examples. 3. Using Chapter 9 of the Brown (2006) text, succinctly explain the primary purpose of Presidential Decision Directive 63 (PDD 63) 4. UsingChapter 10 of the Brown (2006) text, in your opinion, from a business perspective, is the Department of Homeland Security a necessary...
1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3...
1.In your own words, define critical infrastructure protection (CIP) and the goals of CIP. Provide 3 examples. 2. In your own words, define critical infrastructure assessment (CIA) and the goals associated with CIA. Provide 3 examples.
What is the role of Homeland Security in critical infrastructure protection? give an example.
What is the role of Homeland Security in critical infrastructure protection? give an example.
What are the Arguments for Protection? Define each of the arguments for protection. Do you believe...
What are the Arguments for Protection? Define each of the arguments for protection. Do you believe that the arguments for protection are necessary or unnecessary? Are some necessary? Explain your answers using current events.
answering the following questions in short essay questios 1). describe and define levels of social work...
answering the following questions in short essay questios 1). describe and define levels of social work 2). Define social welfare policy and what are some key terms in the definition 3). What do we mean by the " myth of autonomous"? 4)list and discuss some advantages and disadvantages to both society and the client of cash benefits and in-kind benefits.
Examine one of the Critical Infrastructure Sector-Specific Plans (Department of energy/defense/ homeland security/environmental protection agency), and...
Examine one of the Critical Infrastructure Sector-Specific Plans (Department of energy/defense/ homeland security/environmental protection agency), and offer a brief analysis of the strategy, strengths, weaknesses, and recommendations for enhancement of the plan.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT