Preview 50% of the Answer Below
Answer Preview
A. Introduction
1
No |
Title |
Brief Description |
1 |
Customs and Border Protection |
Guarding and controlling the border entry points. |
2 |
Immigration and Customs Enforcement |
Customs service and law application for every visitor or possible immigrant |
3 |
Citizenship and Immigration Services |
Processing requests from immigrants and citizenship applicants. |
4 |
Transportation Security Administration |
XXXXXXXXXXXX XXX XXXXXXXXXXX XX XXXXXXXXX XXXXXX XXX security XXXXXXXX |
X |
Federal XXX Enforcement Training XXXXXX |
XXXXXXXXX, improving XXX XXXXXXXXXX XXXXXXXXXXXXX working for XXX XXX |
X |
Federal Emergency Management Agency |
Civil protection in XXXX of XXXX-time terrorist and XXXXXXX calamities threats |
7 |
XXXXXXX &XXX; Technology XXXXXXXXXXX |
XXXXXXXXXX XXXXXXXX XXXXX for guarding the XXXXXX against cyber XXXXXXX. |
X |
XXXXXX XX XXXXXXXXXXXXX XXX Communications in XXX National XXXXXXXXXX and XXXXXXXX Directorate |
XXXXXXXXXXXX security policies and XXXXXXXX in cases XX XXXXX XXXXXXX. |
X |
XXXXXX of XXXXXXXXXXXXXX XXXXXXXXXX |
XXXXXXXXXX XXX major infrastructure in the XXXXXXXXX. |
XX |
Office XX XXXXXXXXXX Coordination |
Measuring XXXXXXXXX XXXXXX XXXXXX XX a daily XXXXX XXX keeping XXX XXXXX departments informed about it. |
XX |
XXXXX Guard |
XXXXXXXX XXX XXX borders XX United States |
XX |
XXXXXX XXXXXXX |
Intelligence XXXXXXXXXX carried for detecting XXX preventing terrorist cells |
3. The XXXXXXXX XXX objectives of XXX current XXXXX XX XXX Security Policy Framework:
X.3.1 XXX information security policy has a unitary vision and procedure, applicable for all the XXXXXXXX and XXXXXXX.
X.3.2 The security policy XXXXXXXXX XXX an XXXXXX understandable terminology XXX XXXXX XXXXXXXX. XX some XXXXX XXXX be considered as XXX technical, a XXXXXXXX XXXX be presented.
1.3.3 XXX XXXXXXXXX will XXXX XX XXXXXXXXXXX XXX XXXXXXXXX the current XXXXX XX the XXXXXXXX policy. XXX former XXXXXXXXXXX, rules, XXX directions XXXX become obsolete.
1.X.X This policy XXXX also include sections XXXXXXXXXX XXX external organizations XXX partners that will need XX some point to access the IT or communication infrastructure.
1.3.X This XXXXXXXX XXXXXX will XXXXXXX national XXX international regulations in XX policies XXX it XXXX seek XX building a best practice guide for the XXXXXX XXXXXX-XXXXXXX XXXXXXXXXXXX, even XXXXXXX XX DHS XXXXXXXXXXX XXXXX.
1.X.6 XXXX XXXXXXX XXXXX XXXX improve the XXXXXXXX XXXXXXXX regarding the usage of XXX XX infrastructure XXX it XX expected to XXXXXXX overall efficiency in XXXXX.
X. The Framework Core
The current XXXXXXXXX XXXX will provide XXX required activities in order to comply with XXX XXXXXXXXXXXXX expectations XXXX an explicit presentation XX how XX XXXXXXX the full XXXXXXXXXX. D.H.S Framework Care has XXXX XXXXXXXXXX: XXXXXXXXX, XXXXXXXXXX, Subcategories and XXXXXXXXXXX XXXXXXXXXX. XXX XXXXXXXXX document XXXX XX drafted after the XXXXXXXXX XXXXX:
Images Not Shown
•
• Categories XXX XXX subdivisions XX a Function divided into objectives and outcomes. The main purpose XX the XXXXXXXXXX XX to explain how XXXX main function XXX be XXXXXXXXX.
7
•
&XXXX;
Main XXXXXXXXXX:
X. Process XXXXXXXXXXXXXX: XXX current I.T policy will XX supervised XX the Chief Technology Officer. XXXXXX XXXXXXXXX XXX reviews XXXX XX XXXXXXXXX to XXX XXXXX Technology XXXXXXX.
X. Performance XXXXXXXXXX: The overall performance XX each XXXXXXXXXX and XXXXXXX XXXX XX reviewed by the I.T Quality XXXXXX.
X. XXXXXXXXXXXXXXX XXXXXX: Any XXXXXXXXXXXXXXX issue regarding the XXXXXXX procedure XXXX XX XXXXXXXX by XXX I.T Quality XXXXXX.
X. External partners XXXX have XX XXXXXX XXXX XXX XXXXXXXX security XXXXXX.
7. External partners will XX XXXXXXXXXX XX contributors XX XXX XXXXXXXX XXXXXXXX policy and I.T security XXXXXXXXXX XXXX be signed.
XXXXXXXXXX XXX XXXXXX Measures:
XXX XXXXXXX of XXX XXXXXXX XXXXXXXXXX Measures XX XX XXXXXXX XXX XXXXXXXXXXXXXXX, XXXXXXXXXXXX, XXX XXXXXXXXX XX XXX assets and employees.
X. The XXXXXXXXX will receive a badge XX their XXXXXXXXXX XXXX XXX Internal Security Office. XXX badge XXX granted access in XXX XXX buildings and IT XXXXXXX, XXXXXXXXX XX XXXXX corresponding XXXXXXXXXXXXXXXX.
X. The badge can only XXX XX the XXXXXXXXXXXXX XXXX. XXXXX XXXXXX XXXX XXXXX XXXXXXXXXX, XXXX if XXXX hold an equal position, task or responsibility, XX strictly XXXXXXXXX.
10. Visitors will get a XXXXXXX badge XXXX XXXXXXX XXXX XXX XXXXXX XXXXXX.
11. XXXXXXXX XXXXXX, direct and XXXXXXXX supervisors have XXX XXXXX XX ask XXX XXXXX a badge, XXXXX XXXX XXXX consider so.
12. XXXXXXXX agents cannot leave XXXXX guarding XXXXXXXXX, except cases of unit emergencies.
XX. Data XXXXXXXXXX XXXXXXXX XXXX be XXXXXXXX with XXX purpose of controlling the flows XX information.
XX. XXXXX the I.X equipment in order to access websites in personal purposes is XXXXXXXX XXXXXXXXX.
15. XXXXXXXXX XXX XXXXXXXX XXXXXXXXX XXXXXXXXX XXX XXX limited XX XXXXXXXXXX content XXXXXXXXX, XXXXXX XXXXX XXXXXXXXX, XXXXX, XXXX rooms XXX forums XXX XXXXXXXX purposes is XXXX XXXXXXXXX.
XX. The XXXXXXXX traffic XXXX be monitored XXX XXXXXXXXXX XXXXXXX XXXX be extracted XX the I.X XXXXXXX Office.
17. The entire I.T XXXXXXXXX XXXX have XXX USB plugs and XX-ROM XXXXXXX disabled.
18. XXXXXX XX USB plugs will XX granted only XXXXX a special XXXXXXX signed by XXX XXXXXXXX’s direct XXXXXXXXXX and XXXXXXXX by XXX I.T Quality Office.
19. XXX intranet XXX be XXXXXXXX XXXX with security XXXXXXXXXXXX issued XX the I.X department. XXXXX XXXXXXXX XXX XXXXXXXXXX XXXXXX XX XXX intranet XXX XXXX from XXXXXXXX XXXXXXXXX.
XX. Two-XXXXXX XXXXXXXXXXXXXX XXXX XX XXXX XXX special XXXXXXXX XXXXXX.
21. XXXXXXXX XXXX XX XXXXXXXXX XXXXXXXXXX XXX Application Development cycle.
XX. The used XXXXXXXX XXXX XX internal developed or a XXXXXX build one by XXX external partners.
23. Each software platform XXXX have access levels corresponding to XXX privilege XXXXXXX XX XXX user.
XX. Each XXXXXXXX XXXX have an XXXXX trail and an XXXXXXXX XXX report, generated XXX stored on XXXXX equipment XXXX the XXXXXXXXX XXX. In XXXX XXX, XXX logs XXXXXX XX XXXXXXX if XXX user equipment XX XXXX exposed or hacked.
25. The XXXXXX software XXXXXXXXXXX and XXXXXXXXXXXXXX XXXXX XXXX comply XXXX the national XXXXXXXXXXX.
26. DHS internet and XXXXXXXX XXXXXXXX XXXX XXXXXXXXX XXXXXXX in the XXXXXXXXX XXXXXXXXX. Users must XXXXXXXXXX and XXXXX that XXXXXXX using the cookies, XXX XXXXXX will XX very limited.
27. The XXXXXXX will XXXXXXX browsing information XXXX XXX users for XXX XXXXXXX of XXXXXXXXX possible XXXXXXX and security issues in the internal I.X equipment.
XX. In XXX D.H.S facilities, XXX badge readers XXXX create XXX XXXXXXXX XXXX XXXXX XXXX. XXX internal security XXXXXXXX will be able to XXXXXX XXX XXXXX XXX itinerary XX XXXXX XXXXXXXX or visitor.
XX. XXX XXXXX USB XXXXXX XXXXXXXX in XXX equipment, XXXXX the plug-in XXXXXX XXX XXXXXXX, will XXXX XX XXXXXXX an XXXXXX XXXXXXXX consent. XXX form will appear XXXX XXXXXXXXX XXX USB XXXXXX and the XXXXXXXX will XXXX XX XXXXX a brief XXXXXX XXX the need XX using the USB XXXXXX.
">