i need replies for these 2 discussions

Question: Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure. For some additional reading, take a look at the latest Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

After reading chapter 1 and looking at the link above, you’re ready to participate in the first discussion.

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.

You must do the following:

Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.

Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)

1. How DHS should handle the situation described in the preceding paragraph.

United states faces hundreds of threats from foreigh countries , individuals and terrorism organization. Homeland security mission getting complicated every year to protect American assets and interest as large vulnerabilities of network security and inter connectivity of critical systems. To avoid cyber threats DHS is using big data tool to make infrastructure and nation more secure.

Since cyber attack is already taken palce, the best approach is to maintain peacfull situation and notify public without any speculations. Whenever such attack’s happens it is better to hold emergency meetings with the effected organizations such as electric grid infrastructure , department of defence and information technology and also financial companies. By bringing together it will assit in estabilishments of cyber threats and damages brought by such type of attacks.

In regards to presidential executive order on strengthening the cybersecurity of federa networks (Carafano & Heyman, 2015). The order got palced within the days which means government incident teams are in place. This ensure’s that incident reponse team in right place and takes action like how attack heppend and how huge impact is depending on SLA. All departments should come together to get back control of all the systems before damage happened and all loopholes should get fixed before damages takes place (Baggett & Simpkins, 2018)

DHS next step should estabilish different ways to prevent cyber attacks before anything occurs. They need to use different techniques such as deception which makes attacker whether it is real system with limitation which wastes hackers time. To avoid cycber attacks DHS is using Big data tools to make infrastructure more secure.

2. Since the attack has coincidentally willed be perfect if they endeavor to keep up a peaceful and calm condition close by advising the public the need to keep up a vital good ways from any sort of hypotheses. The United States Department of Homeland Security (DHS) is an administration office expected to guarantee the United States against risks. Its wide-running commitments fuse flying security, border control, emergency response and cybersecurity. The fundamental fascinating point is to hold an emergency meeting with the governing main associations heads and the affected individuals, for instance, the pioneer of the electric system infrastructure, the hindrance office close by the IT and establishment, of all everybody and cash related foundation of the organization. This portion will help establishment of damages and risks accomplished by such an attack. Concerning the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure of 2017, (Carafano and Heyman, 2015).the solicitations required to be set up inside days which suggested that the organization event answer bunches are by and by set up.

A bit of the methods DHS can encourage to control the advanced attack from further destruction to the US economy are underneath:

  • The DHS need to adapt to the circumstance from various ranges in a lot measurements.
  • There is fiasco response and sensible objectives plans should be perceived prerequisite of greater security checks, the prison gauges must be set up after the decision in spite of the guessed parties, etc.
  • In particular basic thing that DHS must be centered around is decision of the circumstance by sensible crisis response structures.
  • Segregate the system from suspected frameworks and limit the quick assessment to find the real wellsprings of attack. For this circumstance it is an enormous degree encouraged cyber-attack.
  • Oust the risks from the structures with the guide of good master authorities and execute the required affirmation measures to hinder it in future.
  • Hazard monitoring and quick response bunch is strengthening to evade such attacks in future.
  • Perform the research the more than a few divisions to arrange out the security gauges taken with the guide of them or going to execute.
  • A countrywide level standard of prosperity need to make obligatory to all the ventures and divisions in the country. Thusly the remote screw ups can be evaded, due to how they are additionally results in security bottlenecks.
  • Upgrade the client center and assemble a responsible direct and activities.