Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Phase 1 due in Week 3 Phase 2 due in Week 5 Phase 3 due in Week 7 Phase 4 due in Week 9

Case Study: National Infrastructure Protection Plan

Phase 1 due in Week 3

Phase 2 due in Week 5

Phase 3 due in Week 7

Phase 4 due in Week 9

On your first day as an Information Systems Security director, you met with the Chief Information Officer. During the meeting, he revealed to you his deep concerns about the Infrastructure Protection Plan. He asked you to read the Department of Homeland Security. (2009). National Infrastructure Protection Plan. Retrieved from http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf carefully and focus more on chapter 6: Ensuring an Effective, Efficient Program Over the Long Term.

Since he realizes that you are new to this position he asked you to deliver the final plan, memo and budget in 7 weeks (week 8) but he setup 3 checkpoints for you to deliver parts of the plan to ensure consistent progress of the deliverables before the big presentation in week 8.

Phase 1: Memo - due in week 3

In this phase, you need to create 3-5 page professional memo about your assessment of what needs to be done to meet the standards based on the National Infrastructure Protection Plan. You need to make sure that the language in the memo is clear of free of errors. You also need to be creative in presenting this information to capture the most important points from the National Infrastructure Protection Plan. You need to demonstrate critical thinking to prioritize the action items based on your findings.

Click here to view the grading rubric.

Phase 2: Communication plan - due in week 5

In this phase, you need to communicate with your troops about the National Infrastructure Protection Plan, through your information in the memo. The communication plan should involve a diagram showing the flow of information, the timing of the communication as well as the media of the communication. You also need to submit drafts of any communication pieces of your communication plan.

Phase 3: Budget forecasts - due in week 7

In phase 3, you need to create a Spreadsheet to capture the financial components involved in the plan. Please be sure to cover all the items you included in your memo and in your communication. Also, this is the time to amend your memo based on the budget if you need to do so.

Phase 4: Final presentation - due in week 9

The fourth and final phase is to create a professional presentation of no more than 10 slides to serve as an executive overview detailing all the aspects of the plan. Remember that your presentation is the first item the team will look at, so try to capture all the ideas in a concise way to make the team eager to read the memo, the budget and consider your plan

Show more
  • @
  • 165 orders completed
ANSWER

Tutor has posted answer for $50.00. See answer's preview

$50.00

**************************** ********** *********** ********** ************************* ********** ********* 1: MemoTo: ***** Information ************ Information ******* ******** ************* January 21 2017Subject: ******** ************** ********** ****** an“information systems security ********** find **** **** ***** *** ******* ******** structure ** the reconciliation ** ******** and ****** **** insurance ********* *** *********** techniques **** ** **** ******** program ** ********** **** ********* *** NIPP ********* ********* *** prioritization ** protection *** *********** activities *** ************ ********* **** parts ** ********* that administration *** private ******** assets are ************* ***** They ***** *** **** ********* for ********** danger ** diminishing vulnerabilities preventing ***** *** minimizing *** ******** ** **** monger ******** and other ********* *** ************** fiascos *** **** offers *** structure that ******** a **** ** ******** ********** ** well ** *********** **** **** ********** will *** ** **** *** ******* the nationwide program ** **** **** **** ***** *** parts over *** extended haul(ANDERSON 2013)To successful *** NIPP **** supplement ********** ***** *********** ** help ***** **** for secure ******* respond ** *** ****** ************* ******************** natural ************ ** well asvarious ****** ***** ******** ***** ** **** ** procedures at *** ******* ************ in ******** ** ******** ****** ** ************** ******* CIKR assurance ************ ***** ***************** 2013) ** **** **** *********** *** ************** **** ******* ** the expanded ****** setting ** ******** ***** of CIKR ********* ********* plans *** ******** counting ******** coherence and ******** ******** Execution ** NIPP ** *********** amongst CIKR *********** ** ********* that it doesn't ***** about the ********* ** *********** ** ********** ****** ************** supplies **** proposal little improvement ** **** ************* ********* ********** ******** the ************** ** **** defenselessness *** ****** **** Risk ************** ******** choosing which ********* ******** ** **** ** light ** a settled **** ****** ********* ********* **** ******************* create ** which risks vulnerabilities *** ******* ********** *** after **** **** ** ****** *** *********** ** ****** to diminish ***** risks(gao ***** *** arrangement ***** *********** a ********* and * synopsis ** ********* to ******* *** ************ *** ******** ****** *** ************* of *** ********** *** ******** ** ***** framework *** critical assets *** overhauled **** **** ******** ***** as * potential ***** *** instructive ********* *** local ***** and ************ ************ to **** ***** **** ** *** ********* ******** underneath· *** unique national ******** ****** which ***** on a ********** *********** ** ***** ********* ** that as it *** *** ********* ***** ** be ******** ** ****** *** ************ ** ******** *** *** ***** **** saver frameworks *** ********* ******************** ********** ** *** ***** *** ************ ****** **** a specific end **** to **** up ************* *** local ******************** ******* *** **** ***** ** ** ******** *** ***** *** still clarify *** national system *** ***** ************** security *** *********** *** also ******** learning to state *** ***** pioneers for ******* ** their ***** framework ****** *** ******** ********** *** **** ought to ******* ******* administration *** ************ *********** ** *** ******* ******* gained from activities *** ******** *** *** ******** *********** ****** * ******** ******* ** ****** ******** times ***** lives *** ******** ********** ***** McNeill *** ******* ***** ********* ********** **** **** level of **** **** ********** ******** *** ************* ******** ** ************* ******** to ensuring ********* **** **** assortment ** ******* ** ***** of ******** ******* ******* **** it ** ********* ** ****** **** **** ***** **** conceivable disturbance ******* ********** ******* *** ***** ***** ***** **** ******** to ****** *** actualize risk ****** ********** ** ********* *** ************ ** ***** **** claim *** **** ** ******* ************ However ********** offices *** donatevital ****** ** “CIKR” ********* then *** ************ *** ****** ******** to ******* dangers(Jena ***** ******* *** Richard Weitz ******** ******** they have ****** ******* into ****** fear based ********* ******* ******* US ***** ********* ** **** ****** organizations can ******** ****** to upgrade believability ** SSPs ** ********* business clients ******* guaranteeing **** *** ***** compose **** *** ************ ** *** ****** *** **** in ** with *** ********* ******** division ** **** ** ***** ***** ***** ********** *** ********** and ************************ ***** ***** foundations ** *** **** ******* * superior thought ** parts *** *********** ** **** separate ******** *** ********** with ************* evaluations ******** *********** ******* different ********* ******** in ***** ********* insuranceThe ** states concede ********* *** ended ** ***** *** ***** ********** *** ********* ********* reaction *** ************ ********** outside the ******* ************* ******* *********** ****** this ** *** ******* ******* ********* ***** not ********** *********** ********** ************ ***** ** ******* DHS indispensably require in *** ********* **** delivering prerequisites ** ******** ******** ** ************* ****** requests *** assets ***** or measures **** to ***** or ****** **** ************ harm ** *************** ***** With ******** ** **** insurance ************ ****** ** discourage risk ********* *** ********** or ******** *** ************ ********* ** * **** ***** ********* assault ** another existence ********* ** **** ** include an wide variety ** ********* for ******* ******** ******* ********* *********** ** **** ** ********** ******* ****** ********** **** ********* **** configuration ** ********** ********** ** ****** *************** presentingsafety ********** proceeding ********* ****** preparing *** ***** *** *** performing ************* ******** ***** different others(Jena Baker ******* and ******* Weitz ********** ** ************* **** A ******* part ** the ***************** sector” ** ********* ********* *** to **** ********** with *** own ******** and *** ******** ************ to distinguish ********** ****** ******* ******** ******* ****** defensive ******** *** ******* ******* ********* *** ******* part is the ********* ******* in ****** ** securing *** private segment interchanges ********** *** resources(Jena ***** ******* *** ******* ***** ***** The business *** * since quite * while *** ******* ********** *** ******** ******** ******* and ******* **** ******* *** *** reestablishing administrations ** *** outcome of ******** They *** ********* *** capacity ** *** ******** ********** to ****** **** ***** of ********* ****** *** ********** of ********* frameworks *** ******* ******** *** ************ ****************** ******** ****** *** ************ **** routinely *** ** *** ********* *** ********* of ********** to keep *** ******** ************* ******* ************ versatile to withstand ******* *** ********** ******* *** **** those ** ****** ** ******* ************** ***** systems ***** * noteworthy *********** happens **** ****** together to **** **** ****************** ******* As * ******* ** *** *********** Infrastructure ********** Plan”Security *** ******* ** ********* ****** ** ********* for ******* moving ******* business *********** ********* ******* It ************ *********** what's **** ********** ** ******** *************** ********** ******** ********** ***** ************** *********** ********** workforce ******** ******** or ******************* ****** efforts ***** ********* ********** ****************** **** ******* The ******** ************** framework is ** ********* arrangement ** ********** that ***** ********* *********** and *************** with ********* proprietorship(Swanson ***** *** framework ************ ******** remote ********* **** *** ************ ********** and includes *** ******* ********* that ******* the ******** and ***** ******** **** frameworks *** ************** ************* that ******* work and ****** *** ******** ************** ********* **** ********** ********** current ******** and ********* ************ into ****** ******** design ******** congruity arrangements *** calamity ************ techniques(Robert *********** ********** 3: ****** ***************************** * ****** ******** *** National ************** Protection Plan ********* from ********************* ****************************************************************************************************** ****** National ************** ********** Plandhs ****** ******** ********* Communications ******* ****** CRITICAL ************** PROTECTIONgmu ****** ******** Infrastructure *********** Elements ** **** **** ***** McNeill and ******* ***** * ****** *** to *** ******** Security Critical-Infrastructure Protection ****** * Guide *** ******** ********* **** heritage: *********************************************************************************************************************************************** Radvanovsky J B ****** ******** ** SCADA/Control ******* *************** M ****** *********** ******** ***** *** Federal *********** *******

Click here to download attached files: Infrastructure Protection Plan.docx
Click here to download attached files: National Infrastructure Protection Plan.pptx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question