Computer Science Homework Help

Chapter 4 recording: https://us-lti.bbcollab.com/recording/7008976c33494304880fca98790dbebb Resources https://www.nist.gov/sites/default/files/documents/itl/csd/NIST_USRP-Cisco-Cyber-SCRM-Case-Study.p

Chapter 4 recording:

Get Your Custom Essay Written From Scratch
We have worked on a similar problem. If you need help click order now button and submit your assignment instructions.
Just from $13/Page
Order Now

https://us-lti.bbcollab.com/recording/7008976c33494304880fca98790dbebb

Resources

https://www.nist.gov/sites/default/files/documents/itl/csd/NIST_USRP-Cisco-Cyber-SCRM-Case-Study.pdf

http://spendmatters.com/2013/02/28/evaluating-supply-chain-risks-with-single-vs-multiple-vendor-sourcing-strategies/

https://www.industrystarsolutions.com/blog/2018/09/5-supply-chain-disruptions-reduce-impact/

Question:

Evaluate the Presidential Order that relates to strengthening cybersecurity that relates to critical infrastructure:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

Look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is shut down, telephone traffic is seriously limited and satellite communications are down (limiting the Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce and financial institutions are also severely hit. Please explain how DHS should handle this situation.