The goal of this paper for you to write your opinion on Homeland Security Legal and Ethical Issues without using first or second person. In this paper, you get the opportunity to write your point of view on the material reviewed during the week – and the best part is that there is no wrong answer! This paper is your opinion, and as such, it is your job to express your thoughts in a manner that is comprehensible and clear for any and all readers. Feel free to write your thoughts freely, without any constraints.
After you finished the readings you selected for the week, it is time to brainstorm. Some simple brainstorm techniques for writing reflection papers can involve you answering some of the basic questions below:
How did the material on Homeland Security Legal and Ethical Issues affect you?
Did your learning about the material on Homeland Security Legal and Ethical Issues change your mind about something? If so, how.
Has the material on Homeland Security Legal and Ethical Issues left you with any questions? If so, what are they.
Were there any unaddressed critical issues not covered by the material on Homeland Security Legal and Ethical Issues?
How will the material on Homeland Security Legal and Ethical Issues impact your future in Homeland Security?
Components of the Reflection Paper
Introduction – specifies what you are reflecting upon.
Body Paragraphs – examines the ideas and experiences you have had in context to your topic. Be sure that each new body paragraph starts with a topic sentence. Remember that your paper must be at least 2½ pages long and no more than 3 pages so clear and concise writing is critical.
Conclusion – summarize what you have learned from the material. Tell the reader how this knowledge affected your overall understanding of the subject. Describe the feeling and overall lesson that you had from the material on Homeland Security Legal and Ethical Issues.
Your paper must be at a minimum of 2½ pages and a maximum of 3 full pages. It is important that you do not fall under or exceed the required page length since in the world of Homeland Security your readers, Homeland Security professions and decision-makers have limited time to spend on a paper and learning to write concisely, and presenting your paper in a manner that matches there reading style is critical.
Type in Times New Roman, 12 point and double space. One-inch margins left, right, top, and bottom.
No direct quotations.
All paraphrases require a reference. All references require a paraphrase.
Follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework.
All submissions will be graded using the assignment rubric.
: Information Security and the National Infrastructure
Read the Infosecurity Magazine article, Using Information Security to Protect Critical National Infrastructure: Energy Sector is Hackers’ Biggest Target.
Write a 2 page paper in which you:
Explain in your own words the information security concerns that exist in protecting the United States’ national infrastructure.
Describe why the author of the article says that the oil and gas industries are prime targets for cyber criminals—more so than other infrastructures—and state whether or not you agree and why.
Conclude why there is a need to regulate SCADA and industrial control systems and why there is concern that this is not being dealt with appropriately.
Using the Internet, find an article that either supports the need for regulating SCADA or that discusses a recent attack. Discuss how this article validates the need for tighter controls.
Your final project is based on the concepts that have been presented throughout this course and will focus on the critical infrastructure you identified in the Unit IV Topic Selection assignment.
In this project, you will develop a threat assessment, analyze the threats, and propose a resiliency plan with critical infrastructure protection (CIP) strategies to mitigate and respond to threats to facilities and networks.
Your project must, at a minimum, include the components listed below.
Identify the specific critical infrastructure you selected in Unit IV. Determine the sector with which the infrastructure is associated, and explain why CIP efforts are needed.
Develop a threat assessment from an all-hazards perspective for the critical infrastructure. You may use any existing assessment tools, such as the mission, symbolism, history, accessibility, recognizability, population, and proximity (MSHARPP) worksheet or the criticality, accessibility, recuperability, vulnerability, effect on population, and recognizability (CARVER) matrix, which were introduced in Unit IV. Examples of the MSHARPP worksheet and CARVER matrix can be found in the Unit IV Nongraded Learning Activity. You may also create your own threat assessment tool. Your assessment must be able to meet the criteria below.
Assess natural, technological, and manmade threats or potential hazards that could impact critical infrastructure across both physical and digital domains.
Determine any cybersecurity threats or issues.
Analyze the assessed threats to facilities and networks supporting the infrastructure.
Based on your analysis, outline a resiliency plan that incorporates strategies to mitigate threats to facilities and networks. The plan must identify, at a minimum, the following components:
strategic objectives and action items for changes needed or for improved resiliency;
exercise or training needed to strengthen readiness and response efforts; and
any necessary partnerships, agency collaboration, or information sharing that can support the resiliency plan.
Your final project must be a minimum of four pages in length, not counting any assessment worksheets or the title page and references page.
You must use at least four reliable sources to support your project, one of which must come from the CSU Online Library. Sources may include official government resources or the textbook. All sources used must be properly cited. Adhere to APA Style when creating citations and references for this project.
Insert any assessment worksheets as an appendix to your written document.
You are encouraged to review the rubric so you fully understand how this project will be graded.
Review Radvanovsky and McDougall’s (2019) notes on pp. 127–128 of your textbook. Consider the many challenges introduced in the chapter regarding the sharing and controlling of critical infrastructure information. After conducting any further research you may need, write a scholarly paper in which you offer your analysis and opinion of the authors’ proposal.
How will it (the proposal) or how will it not reduce existing challenges to sharing and controlling critical infrastructure?
What challenges might remain unaffected by their proposal?
Offer at least one recommendation of your own in direct response to their statement, “The level and knowledge of resources for various threat actors is increasing while the skills required to accomplish attacks…is decreasing” (Radvanovsky & McDougall, 2019, p. 128).
Your paper must be a minimum of two pages in length, not coutning the title page or references page. It should demonstrate critical thinking through expression of your informed and substantiated opinion as well as present insightful and thorough analysis with strong arguments and evidence.
You must use at least two reliable sources, not including your textbook, to support your paper. All sources must be properly cited. Adhere to APA Style when creating citations and references for this assignment
Consider the scenario below.
The northwestern United States has experienced a blackout. Washington, Oregon, and Idaho are all without power. Assume your state and jurisdiction is located in either Washington, Oregon, or Idaho. The unusually hot summer for the area has resulted in high electrical consumption, which has overloaded the electricity grid. Today, the core servers and remote sites began to fail. The power system in the area experienced a major loss of all systems. Within 1 hour, nearly one third of each state was affected. Throughout the blackout areas, businesses shut down, rioting became an issue, traffic became gridlocked, people were stranded in elevators, and the 911 system became jammed with all of the response calls. Responders are having a hard time responding because of the traffic gridlock. Media outlets are reporting that the power outage is because of a terrorist attack, even though it is unknown.
During the incident, please describe the actions that your jurisdiction would take utilizing the multiagency coordination system (MACS). Discuss how the MACS would prioritize resources. Would there be anything that you would change? Explain your rationale.
Your journal entry must be at least 200 words in length. No references or citations are necessary.
For this assignment you will write a research paper that reports on a terrorist event that has happened in U.S. history. Refer to the annotated bibliography that you submitted in Unit III, and review your instructor’s feedback.
Review the research that you already conducted on your specific event, and address the issues listed below in your paper.
Summarize what happened in the terrorist event.
Describe the environmental, political, economic, and sociological impact of the event and the response at all levels of government.
Identify the type of response partners and agencies involved with the response and recovery of the event as well as after actions and lessons learned from the event.
Provide information about the critical infrastructure that was impacted and how the role of protecting this infrastructure was forever changed due to this event.
Discuss the national strategies for the U.S. Department of Homeland Security as it relates to this event.
Support your research paper with a minimum of two sources from the Library.
Your research paper should be a minimum of three pages in length, not counting the title or references pages. This assignment should be formatted according to APA standards.
Part I: Discuss one significant obstacle that stood out to you for the responders in one of the events discussed in the required unit resources for this unit (i.e., Hurricane Katrina, BP Deepwater Horizon oil spill, or Boston Marathon bombings). Explain how this obstacle could be overcome. Explain your rationale.
Part II: How might you apply the concepts learned in this course to your current or future work?
Your journal entry must be at least 200 words in length. No references or citations are necessary.
Think about and describe a time when you served in a leadership role. What did you do in that role to keep employees engaged in cybersecurity procedures? If you have never been in a leadership role, discuss ways that you think you would keep employees engaged in cybersecurity procedures.
Your journal entry must be at least 200 words. No references or citations are necessary.
For this project, you will create a cybersecurity poster to keep employees engaged with and aware of cybersecurity
procedures. The poster can be created in Microsoft Word or Microsoft PowerPoint. Be creative. Include graphics.
Remember that, in order to engage employees, cybersecurity procedures should be convenient, reasonable, and credible.
Ensure that you create an original poster. Do not copy one from the Internet. Then, write a one-page essay explaining the
purpose behind your poster and how it effectively portrays a means to keep employees engaged and aware of cybersecurity
procedures. Include a reference page.
Please include at least 1 reference with a citation in your submission. Adhere to APA Style when creating citations and
references for this assignment. APA formatting, however, is not necessary
Review, study, and report on a domestic or international terrorist event. Pick one of the following events or an event of your choice.
World Trade Center
Oklahoma City Federal Building bombing.
The Aurora, Colorado active shooter incident.
Then, address the following:
Look for indicators that might have been missed in preventing the event.
Suggest solutions to prevent a repeat of the event.
The paper must be 3-4 pages.
Use proper APA formatting and citations, including ‘in-text’ citations.
Reference at least 2 outside credible resources.