Chat with us, powered by LiveChat references with citations. must each 1&2 separate papers | acewriters
+1(978)310-4246 credencewriters@gmail.com
  

1)Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:https://www.whitehouse.gov/presidential-actions/pr…After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation. please explain how DHS should handle the situation described in the preceding paragraph.2)Discussion question (Instructor)On Page 3 of the Introduction in our textbook – Managing & Using Information Systems: A Strategic Approach – Figure 1-1 lists reasons why business managers should participate in information systems decisions. Reply to this Discussion question (800 or more words)Select 4 of these reasons and find a peer-reviewed journal article to support each reason. Try to find articles that are less than 5 years old. You will have 4 reasons and 4 journal articles. In one paragraph, summarize the article. Make sure you cite and reference the articles correctly.

error: Content is protected !!