Preview 50% of the Answer Below
Answer Preview
A. Introduction
1
No |
Title |
Brief Description |
1 |
Customs and Border Protection |
Guarding and controlling the border entry points. |
2 |
Immigration and Customs Enforcement |
Customs service and law application for every visitor or possible immigrant |
3 |
Citizenship and Immigration Services |
Processing requests from immigrants and citizenship applicants. |
4 |
Transportation Security Administration |
XXXXXXXXXXXX and XXXXXXXXXXX XX XXXXXXXXX XXXXXX and security XXXXXXXX |
5 |
Federal Law Enforcement Training XXXXXX |
Preparing, improving XXX evaluating professionals working for the XXX |
X |
Federal XXXXXXXXX XXXXXXXXXX XXXXXX |
Civil XXXXXXXXXX in XXXX XX real-time terrorist and XXXXXXX calamities XXXXXXX |
X |
XXXXXXX &XXX; Technology XXXXXXXXXXX |
Developing XXXXXXXX XXXXX XXX XXXXXXXX XXX nation against cyber attacks. |
X |
Office XX XXXXXXXXXXXXX and XXXXXXXXXXXXXX in the National Protection and Programs Directorate |
Implementing security policies XXX XXXXXXXX in XXXXX of XXXXX XXXXXXX. |
9 |
XXXXXX of Infrastructure XXXXXXXXXX |
XXXXXXXXXX the major infrastructure in the XXXXXXXXX. |
10 |
XXXXXX of XXXXXXXXXX XXXXXXXXXXXX |
XXXXXXXXX XXXXXXXXX threat levels on a daily XXXXX and keeping XXX other XXXXXXXXXXX XXXXXXXX XXXXX it. |
11 |
Coast Guard |
XXXXXXXX the XXX borders of United XXXXXX |
XX |
XXXXXX Service |
Intelligence operations XXXXXXX for XXXXXXXXX and XXXXXXXXXX XXXXXXXXX cells |
X. XXX benefits XXX objectives XX XXX XXXXXXX XXXXX XX the Security Policy Framework:
1.3.1 XXX XXXXXXXXXXX XXXXXXXX policy XXX a unitary XXXXXX XXX XXXXXXXXX, XXXXXXXXXX XXX all the XXXXXXXX XXX offices.
X.X.X The XXXXXXXX policy framework has an XXXXXX XXXXXXXXXXXXXX XXXXXXXXXXX XXX every XXXXXXXX. XX some terms XXXX be XXXXXXXXXX as XXX XXXXXXXXX, a XXXXXXXX will XX presented.
1.X.3 DHS employees will XXXX XX acknowledge XXX XXXXXXXXX the current issue of XXX XXXXXXXX XXXXXX. XXX former XXXXXXXXXXX, XXXXX, XXX directions will become obsolete.
1.3.X This policy will XXXX include XXXXXXXX applicable for XXXXXXXX XXXXXXXXXXXXX XXX XXXXXXXX that will XXXX at XXXX point XX access XXX IT or XXXXXXXXXXXXX infrastructure.
1.X.X This XXXXXXXX policy XXXX XXXXXXX national and XXXXXXXXXXXXX regulations in XX policies XXX it will seek on building a best XXXXXXXX guide XXX XXX XXXXXX public-serving XXXXXXXXXXXX, XXXX outside XX XXX supervision XXXXX.
1.3.X This current issue will XXXXXXX the internal XXXXXXXX regarding the usage of XXX XX XXXXXXXXXXXXXX and it XX expected XX improve XXXXXXX efficiency in usage.
B.
XXX XXXXXXX Framework Core will XXXXXXX the required XXXXXXXXXX in order XX XXXXXX XXXX XXX XXXXXXXXXXXXX XXXXXXXXXXXX with an explicit presentation on how to achieve the full compliance. X.H.S Framework Care has XXXX components: Functions, XXXXXXXXXX, XXXXXXXXXXXXX and XXXXXXXXXXX References. The XXXXXXXXX document XXXX be XXXXXXX after the following model:
Images Not Shown
&XXXX;
&XXXX;
&XXXX; XXXXXXXXXXXXX are a more XXXXXXXX XXXXXXXXXXX of the categories, XXXX exact procedures and actions that XXXX implementation in order to XXXXXXX XXX objectives.
• Informative References are a set of standards, guidelines and national regulations offering XXXXX or XXXXXXXXX protection XXX XXX XXXXXXXXXX and the corresponding XXXXXXXXXX.
Main categories:
XXXXXXXXXXXXXX:
X. XXXXXXX implementation: XXX XXXXXXX I.X policy XXXX XX supervised by XXX XXXXX XXXXXXXXXX Officer. Future revisions and XXXXXXX XXXX be submitted XX XXX XXXXX Technology Officer.
4. Performance evaluation: XXX XXXXXXX XXXXXXXXXXX of each XXXXXXXXXX XXX partner XXXX XX reviewed XX the I.T Quality Office.
5. XXXXXXXXXXXXXXX issues: XXX incompatibility issue XXXXXXXXX XXX current XXXXXXXXX will XX mediated XX XXX I.T XXXXXXX XXXXXX.
X. XXXXXXXX partners XXXX have XX XXXXXX with XXX internal security XXXXXX.
X. XXXXXXXX partners will be XXXXXXXXXX XX contributors XX the internal XXXXXXXX XXXXXX XXX I.T XXXXXXXX XXXXXXXXXX will be XXXXXX.
XXXXXXXXXX and Access Measures:
XXX XXXXXXX of the XXXXXXX Protection XXXXXXXX is to protect XXX Confidentiality, Availability, and Integrity of our XXXXXX XXX XXXXXXXXX.
X. XXX employees XXXX XXXXXXX a badge XX XXXXX enrollment XXXX the Internal Security XXXXXX. The badge has XXXXXXX access in the XXX buildings XXX IT XXXXXXX, XXXXXXXXX XX XXXXX XXXXXXXXXXXXX responsibilities.
9. XXX XXXXX XXX XXXX use by the XXXXXXXXXXXXX user. Using XXXXXX from other XXXXXXXXXX, XXXX if XXXX hold an equal XXXXXXXX, XXXX or responsibility, is XXXXXXXX forbidden.
10. XXXXXXXX XXXX get a XXXXXXX badge XXXX limited XXXX and XXXXXX XXXXXX.
11. XXXXXXXX XXXXXX, direct XXX indirect XXXXXXXXXXX XXXX XXX XXXXX XX XXX XXX check a badge, XXXXX XXXX they XXXXXXXX so.
12. Security XXXXXX cannot XXXXX their guarding perimeter, except XXXXX of XXXX XXXXXXXXXXX.
13. XXXX XXXXXXXXXX measures will XX enforced with the XXXXXXX XX controlling the XXXXX of information.
XX. Using XXX I.X XXXXXXXXX in order to access websites in XXXXXXXX purposes XX strictly XXXXXXXXX.
15. XXXXXXXXX any XXXXXXXX XXXXXXXXX including but XXX XXXXXXX XX XXXXXXXXXX XXXXXXX XXXXXXXXX, social media platforms, blogs, chat XXXXX and forums XXX XXXXXXXX XXXXXXXX is XXXX XXXXXXXXX.
XX. The internet XXXXXXX XXXX XX XXXXXXXXX and periodical reports XXXX XX extracted by the I.T Quality XXXXXX.
17. The XXXXXX I.X equipment will have XXX USB XXXXX and XX-XXX drivers disabled.
XX. Access XX XXX XXXXX will XX granted only XXXXX a special XXXXXXX signed XX XXX employee&XXXXX;s XXXXXX supervisor XXX XXXXXXXX XX XXX I.T Quality Office.
XX. XXX XXXXXXXX XXX XX XXXXXXXX XXXX XXXX security XXXXXXXXXXXX issued XX XXX I.X department. XXXXX XXXXXXXX has XXXXXXXXXX XXXXXX XX XXX intranet XXX XXXX XXXX approved XXXXXXXXX.
XX. XXX-factor XXXXXXXXXXXXXX XXXX be used for special intranet XXXXXX.
XX. XXXXXXXX will XX XXXXXXXXX XXXXXXXXXX XXX XXXXXXXXXXX XXXXXXXXXXX XXXXX.
XX. XXX used XXXXXXXX XXXX be XXXXXXXX developed or a custom build XXX XX the external partners.
23. Each software XXXXXXXX XXXX have access levels XXXXXXXXXXXXX XX the privilege granted XX the user.
24. Each XXXXXXXX will have an XXXXX XXXXX and an activity log XXXXXX, generated XXX stored on XXXXX XXXXXXXXX than XXX XXXXXXXXX XXX. In XXXX way, XXX XXXX cannot be XXXXXXX if XXX user equipment is risk XXXXXXX or hacked.
XX. XXX XXXXXX software XXXXXXXXXXX XXX XXXXXXXXXXXXXX XXXXX XXXX XXXXXX with XXX XXXXXXXX regulations.
XX. DHS XXXXXXXX XXX XXXXXXXX websites will XXXXXXXXX XXXXXXX in XXX XXXXXXXXX XXXXXXXXX. XXXXX XXXX XXXXXXXXXX XXX XXXXX XXXX without using XXX cookies, XXX XXXXXX XXXX be XXXX XXXXXXX.
XX. XXX XXXXXXX will collect browsing information XXXX the users XXX XXX XXXXXXX XX XXXXXXXXX XXXXXXXX threats and security XXXXXX in the XXXXXXXX I.T XXXXXXXXX.
XX. In XXX X.H.S XXXXXXXXXX, the XXXXX XXXXXXX XXXX XXXXXX and XXXXXXXX XXXX level logs. XXX internal XXXXXXXX XXXXXXXX XXXX be able to XXXXXX XXX XXXXX XXX XXXXXXXXX of every employee or XXXXXXX.
XX. For every USB XXXXXX XXXXXXXX in XXX XXXXXXXXX, XXXXX the XXXX-in XXXXXX XXX granted, will XXXX XX XXXXXXX an online security consent. XXX form XXXX appear when inserting XXX XXX XXXXXX and the XXXXXXXX will XXXX to write a XXXXX reason XXX the XXXX of XXXXX the USB XXXXXX.
">