Preview 50% of the Answer Below
Answer Preview
A. Introduction
1
|
No |
Title |
Brief Description |
|
1 |
Customs and Border Protection |
Guarding and controlling the border entry points. |
|
2 |
Immigration and Customs Enforcement |
Customs service and law application for every visitor or possible immigrant |
|
3 |
Citizenship and Immigration Services |
Processing requests from immigrants and citizenship applicants. |
|
4 |
XXXXXXXXXXXXXX XXXXXXXX Administration |
Implementing and XXXXXXXXXXX on XXXXXXXXX XXXXXX and XXXXXXXX XXXXXXXX |
|
5 |
XXXXXXX XXX XXXXXXXXXXX XXXXXXXX XXXXXX |
XXXXXXXXX, XXXXXXXXX and evaluating XXXXXXXXXXXXX working for the XXX |
|
X |
Federal Emergency Management Agency |
Civil protection in case of real-XXXX terrorist XXX XXXXXXX calamities threats |
|
X |
XXXXXXX & Technology XXXXXXXXXXX |
XXXXXXXXXX XXXXXXXX XXXXX XXX guarding XXX nation XXXXXXX cyber attacks. |
|
X |
Office of Cybersecurity and Communications in XXX National Protection and Programs Directorate |
Implementing security XXXXXXXX and XXXXXXXX in cases of XXXXX XXXXXXX. |
|
X |
XXXXXX XX XXXXXXXXXXXXXX Protection |
XXXXXXXXXX XXX major XXXXXXXXXXXXXX in the territory. |
|
XX |
Office of Operations Coordination |
XXXXXXXXX terrorist threat XXXXXX on a daily basis XXX XXXXXXX XXX XXXXX departments XXXXXXXX XXXXX it. |
|
XX |
Coast Guard |
XXXXXXXX XXX XXX XXXXXXX of United States |
|
XX |
Secret XXXXXXX |
XXXXXXXXXXXX operations XXXXXXX XXX detecting XXX XXXXXXXXXX XXXXXXXXX cells |
X. The XXXXXXXX and objectives XX XXX XXXXXXX XXXXX of XXX Security Policy Framework:
X.3.X XXX XXXXXXXXXXX security XXXXXX XXX a unitary vision XXX procedure, XXXXXXXXXX for XXX XXX XXXXXXXX XXX XXXXXXX.
1.X.2 XXX security XXXXXX XXXXXXXXX XXX an XXXXXX XXXXXXXXXXXXXX XXXXXXXXXXX for every XXXXXXXX. If XXXX XXXXX will be considered XX XXX technical, a XXXXXXXX XXXX XX XXXXXXXXX.
X.X.3 DHS employees XXXX have XX acknowledge and XXXXXXXXX XXX current issue of XXX XXXXXXXX policy. XXX XXXXXX regulations, rules, XXX XXXXXXXXXX will XXXXXX XXXXXXXX.
1.X.X This policy XXXX also XXXXXXX XXXXXXXX XXXXXXXXXX XXX XXXXXXXX organizations XXX XXXXXXXX XXXX XXXX XXXX at some XXXXX XX XXXXXX XXX IT or communication infrastructure.
1.3.X This security XXXXXX XXXX XXXXXXX XXXXXXXX XXX international regulations in XX policies XXX it will XXXX XX XXXXXXXX a XXXX XXXXXXXX guide for XXX XXXXXX public-XXXXXXX XXXXXXXXXXXX, even outside of DHS supervision XXXXX.
X.X.6 XXXX current XXXXX will improve XXX XXXXXXXX security regarding XXX usage XX XXX XX infrastructure and it is expected to improve XXXXXXX XXXXXXXXXX in XXXXX.
X. The XXXXXXXXX XXXX
XXX XXXXXXX XXXXXXXXX XXXX will XXXXXXX the required XXXXXXXXXX in order to comply XXXX XXX XXXXXXXXXXXXX XXXXXXXXXXXX XXXX an XXXXXXXX presentation XX how XX XXXXXXX XXX XXXX compliance. X.H.S Framework XXXX XXX four components: XXXXXXXXX, Categories, Subcategories and Informative XXXXXXXXXX. The XXXXXXXXX XXXXXXXX will XX drafted XXXXX the following XXXXX:
Images Not Shown
• Functions XXX XXX most XXXXXXXXX cybersecurity objectives. XXX entire security XXXXXXXXXX XXXX is oriented XXXXXX XXXXX XXXXXXXXX. XXXX XXX the XXXXXXXXX: XXXXXXXX, XXXXXXX, XXXXXX, XXXXXXX, XXX XXXXXXX. Inspired from XXXXXXXXXX XXXXXXXXX, XXX XXX XXXX of these functions XXX XX deducted XXXX XXX title. XXX XXXXX XXXXXXXX XXX XX identify potential XXXXXXX with XXXXXXXXX XXX XXXXXXXX measures. XXX second XXXXXXXX has to XXXXXXX the XXXXXXXX I.X system XXXX XXX X.X.S agencies and XXXXXXX.
&XXXX; XXXXXXXXXX XXX XXX XXXXXXXXXXXX XX a Function XXXXXXX into XXXXXXXXXX XXX outcomes. XXX XXXX XXXXXXX of XXX categories XX XX XXXXXXX how each XXXX function can XX fulfilled.
X
• XXXXXXXXXXXXX are a XXXX XXXXXXXX perspective of XXX XXXXXXXXXX, with XXXXX XXXXXXXXXX XXX XXXXXXX XXXX XXXX XXXXXXXXXXXXXX in order to protect the XXXXXXXXXX.
&XXXX; XXXXXXXXXXX References are a set of standards, XXXXXXXXXX XXX XXXXXXXX regulations XXXXXXXX legal or technical XXXXXXXXXX for the objectives and XXX corresponding XXXXXXXXXX.
X. Process implementation: XXX current I.X policy XXXX be XXXXXXXXXX XX XXX XXXXX Technology XXXXXXX. XXXXXX XXXXXXXXX and reviews must XX XXXXXXXXX to XXX Chief XXXXXXXXXX Officer.
X. Performance evaluation: The XXXXXXX XXXXXXXXXXX XX XXXX XXXXXXXXXX XXX partner will be reviewed by XXX I.X XXXXXXX Office.
X. Incompatibility XXXXXX: Any XXXXXXXXXXXXXXX XXXXX regarding XXX XXXXXXX XXXXXXXXX XXXX be mediated by XXX I.T Quality XXXXXX.
X. External partners XXXX have to XXXXXX XXXX XXX internal XXXXXXXX XXXXXX.
X. External partners XXXX XX considered as contributors XX XXX XXXXXXXX XXXXXXXX policy XXX I.X security XXXXXXXXXX XXXX be XXXXXX.
The XXXXXXX of XXX XXXXXXX Protection Measures is to protect the Confidentiality, Availability, and XXXXXXXXX XX our assets XXX XXXXXXXXX.
8. XXX XXXXXXXXX XXXX receive a badge at their XXXXXXXXXX XXXX the Internal XXXXXXXX XXXXXX. The XXXXX XXX granted XXXXXX in the XXX XXXXXXXXX XXX IT systems, XXXXXXXXX XX XXXXX XXXXXXXXXXXXX responsibilities.
X. XXX XXXXX can XXXX use XX XXX corresponding user. XXXXX badges from other XXXXXXXXXX, even XX XXXX hold an equal position, XXXX or responsibility, is strictly XXXXXXXXX.
10. Visitors XXXX get a visitor badge XXXX limited time XXX XXXXXX XXXXXX.
XX. XXXXXXXX XXXXXX, XXXXXX XXX indirect XXXXXXXXXXX XXXX the XXXXX to XXX and XXXXX a badge, every XXXX XXXX XXXXXXXX so.
12. XXXXXXXX XXXXXX cannot leave their guarding perimeter, except XXXXX XX unit XXXXXXXXXXX.
13. XXXX protection XXXXXXXX will be enforced with the purpose XX controlling the flows of XXXXXXXXXXX.
14. Using XXX I.X equipment in order XX access websites in personal XXXXXXXX XX strictly forbidden.
15. Accessing any internet platforms including but XXX limited at multimedia XXXXXXX providers, XXXXXX XXXXX XXXXXXXXX, blogs, XXXX XXXXX and XXXXXX for XXXXXXXX purposes XX also forbidden.
16. XXX XXXXXXXX traffic will be monitored XXX XXXXXXXXXX XXXXXXX XXXX be XXXXXXXXX by the I.X XXXXXXX Office.
17. The XXXXXX I.X equipment XXXX have the USB plugs and XX-ROM drivers disabled.
18. Access XX USB plugs XXXX be granted XXXX XXXXX a special request signed by XXX XXXXXXXX’s direct XXXXXXXXXX XXX approved XX the I.X Quality XXXXXX.
19. XXX intranet can XX accessed XXXX XXXX security XXXXXXXXXXXX issued XX XXX I.T XXXXXXXXXX. XXXXX XXXXXXXX XXX XXXXXXXXXX XXXXXX to XXX XXXXXXXX but XXXX XXXX XXXXXXXX XXXXXXXXX.
20. XXX-XXXXXX XXXXXXXXXXXXXX XXXX be XXXX for XXXXXXX intranet XXXXXX.
Detection XXXXXXXX
XX. XXXXXXXX XXXX be XXXXXXXXX XXXXXXXXXX the Application XXXXXXXXXXX cycle.
22. The used software XXXX XX internal developed or a custom XXXXX XXX by XXX external partners.
23. XXXX XXXXXXXX XXXXXXXX will XXXX XXXXXX levels XXXXXXXXXXXXX XX XXX XXXXXXXXX XXXXXXX XX XXX user.
XX. XXXX XXXXXXXX will have an audit trail XXX an XXXXXXXX XXX report, generated XXX XXXXXX on other equipment XXXX the accessing XXX. In XXXX XXX, XXX logs XXXXXX be deleted XX XXX XXXX XXXXXXXXX is risk XXXXXXX or hacked.
XX. The entire software XXXXXXXXXXX and XXXXXXXXXXXXXX cycle XXXX XXXXXX with the national XXXXXXXXXXX.
XX. DHS internet XXX XXXXXXXX websites XXXX XXXXXXXXX cookies in the XXXXXXXXX XXXXXXXXX. Users must XXXXXXXXXX and XXXXX that XXXXXXX XXXXX XXX XXXXXXX, XXX access will be XXXX limited.
27. The XXXXXXX XXXX collect browsing information from XXX users XXX XXX XXXXXXX XX detecting XXXXXXXX threats XXX security issues in the XXXXXXXX I.X XXXXXXXXX.
28. XX XXX X.H.S facilities, the XXXXX XXXXXXX will XXXXXX and XXXXXXXX XXXX level XXXX. XXX XXXXXXXX XXXXXXXX XXXXXXXX XXXX XX able to XXXXXX XXX XXXXX the itinerary of XXXXX XXXXXXXX or XXXXXXX.
29. For every USB device inserted in XXX XXXXXXXXX, XXXXX the plug-in XXXXXX XXX XXXXXXX, will have XX XXXXXXX an online security consent. XXX form will XXXXXX when inserting XXX USB device and XXX employee XXXX have to XXXXX a XXXXX reason XXX the need of XXXXX the XXX device.
">