Preview 50% of the Answer Below
Answer Preview
A. Introduction
1
No |
Title |
Brief Description |
1 |
Customs and Border Protection |
Guarding and controlling the border entry points. |
2 |
Immigration and Customs Enforcement |
Customs service and law application for every visitor or possible immigrant |
3 |
Citizenship and Immigration Services |
Processing requests from immigrants and citizenship applicants. |
4 |
Transportation Security Administration |
Implementing and supervising XX XXXXXXXXX safety and XXXXXXXX measures |
5 |
XXXXXXX Law XXXXXXXXXXX Training XXXXXX |
XXXXXXXXX, improving XXX XXXXXXXXXX XXXXXXXXXXXXX XXXXXXX XXX the DHS |
X |
XXXXXXX XXXXXXXXX XXXXXXXXXX XXXXXX |
XXXXX protection in case of XXXX-XXXX XXXXXXXXX XXX XXXXXXX XXXXXXXXXX XXXXXXX |
7 |
XXXXXXX & XXXXXXXXXX XXXXXXXXXXX |
Developing security XXXXX XXX guarding XXX nation against XXXXX attacks. |
8 |
XXXXXX XX XXXXXXXXXXXXX XXX Communications in the XXXXXXXX XXXXXXXXXX XXX Programs Directorate |
Implementing security policies XXX XXXXXXXX in cases of cyber XXXXXXX. |
X |
Office of XXXXXXXXXXXXXX Protection |
XXXXXXXXXX the major XXXXXXXXXXXXXX in XXX territory. |
XX |
Office XX Operations XXXXXXXXXXXX |
XXXXXXXXX XXXXXXXXX XXXXXX levels on a XXXXX XXXXX XXX keeping XXX XXXXX XXXXXXXXXXX informed XXXXX it. |
XX |
Coast XXXXX |
XXXXXXXX the sea XXXXXXX XX United XXXXXX |
XX |
XXXXXX XXXXXXX |
XXXXXXXXXXXX operations carried for XXXXXXXXX and XXXXXXXXXX terrorist cells |
X. The benefits and XXXXXXXXXX of XXX current issue XX XXX XXXXXXXX XXXXXX XXXXXXXXX:
1.3.X XXX information XXXXXXXX XXXXXX has a XXXXXXX vision XXX XXXXXXXXX, XXXXXXXXXX for all the agencies XXX XXXXXXX.
X.3.2 XXX XXXXXXXX policy framework XXX an XXXXXX XXXXXXXXXXXXXX XXXXXXXXXXX for every XXXXXXXX. If XXXX terms will be XXXXXXXXXX XX XXX XXXXXXXXX, a glossary XXXX be XXXXXXXXX.
1.X.3 XXX XXXXXXXXX will have XX XXXXXXXXXXX XXX implement the current XXXXX of the security policy. XXX XXXXXX XXXXXXXXXXX, rules, and XXXXXXXXXX XXXX XXXXXX obsolete.
1.X.4 XXXX XXXXXX will also XXXXXXX XXXXXXXX applicable for external organizations and XXXXXXXX XXXX will need at some point to XXXXXX the IT or XXXXXXXXXXXXX XXXXXXXXXXXXXX.
X.X.5 XXXX security XXXXXX will XXXXXXX XXXXXXXX XXX XXXXXXXXXXXXX XXXXXXXXXXX in XX policies and it XXXX seek on XXXXXXXX a XXXX practice guide XXX the XXXXXX public-serving institutions, even outside XX DHS XXXXXXXXXXX XXXXX.
X.3.X This current issue XXXX improve the XXXXXXXX security regarding XXX XXXXX XX the XX XXXXXXXXXXXXXX and it XX XXXXXXXX to XXXXXXX XXXXXXX efficiency in usage.
X.
The current Framework Core XXXX XXXXXXX the required XXXXXXXXXX in order to XXXXXX XXXX the cybersecurity expectations with an XXXXXXXX XXXXXXXXXXXX XX how XX achieve the XXXX XXXXXXXXXX. D.X.S Framework Care has XXXX XXXXXXXXXX: Functions, XXXXXXXXXX, XXXXXXXXXXXXX and Informative References. XXX dedicated XXXXXXXX XXXX XX XXXXXXX after the following model:
Images Not Shown
&XXXX;
•
7
&XXXX; XXXXXXXXXXXXX XXX a XXXX XXXXXXXX perspective XX XXX XXXXXXXXXX, with XXXXX procedures and XXXXXXX XXXX need implementation in order to protect XXX objectives.
•
Main XXXXXXXXXX:
3. Process XXXXXXXXXXXXXX: The XXXXXXX I.T policy XXXX be supervised by the Chief Technology XXXXXXX. XXXXXX revisions XXX reviews XXXX XX XXXXXXXXX to XXX XXXXX XXXXXXXXXX Officer.
X. Performance evaluation: XXX overall XXXXXXXXXXX of XXXX XXXXXXXXXX XXX partner XXXX XX reviewed by XXX I.T Quality XXXXXX.
5. Incompatibility issues: XXX incompatibility XXXXX XXXXXXXXX XXX current XXXXXXXXX XXXX be mediated by XXX I.X XXXXXXX XXXXXX.
6. External XXXXXXXX XXXX XXXX to comply XXXX the XXXXXXXX XXXXXXXX policy.
X. XXXXXXXX XXXXXXXX XXXX be XXXXXXXXXX XX XXXXXXXXXXXX to XXX internal security policy XXX I.X XXXXXXXX XXXXXXXXXX XXXX XX XXXXXX.
XXX purpose of the XXXXXXX XXXXXXXXXX XXXXXXXX is XX protect XXX XXXXXXXXXXXXXXX, Availability, and Integrity of our assets XXX employees.
X. XXX XXXXXXXXX will XXXXXXX a XXXXX XX XXXXX XXXXXXXXXX from the Internal Security Office. The badge has XXXXXXX access in XXX DHS buildings XXX XX XXXXXXX, XXXXXXXXX XX XXXXX corresponding responsibilities.
X. The badge can XXXX XXX by XXX XXXXXXXXXXXXX XXXX. Using XXXXXX from other XXXXXXXXXX, XXXX if they hold an XXXXX position, XXXX or XXXXXXXXXXXXXX, is strictly XXXXXXXXX.
XX. Visitors will XXX a visitor XXXXX with limited time XXX access XXXXXX.
XX. Security XXXXXX, direct and indirect supervisors have the right XX ask XXX XXXXX a badge, XXXXX XXXX XXXX XXXXXXXX so.
XX. XXXXXXXX agents cannot leave their guarding XXXXXXXXX, except cases XX unit emergencies.
13. Data XXXXXXXXXX measures will XX enforced XXXX XXX purpose of XXXXXXXXXXX the flows of XXXXXXXXXXX.
14. XXXXX the I.T XXXXXXXXX in order to access XXXXXXXX in XXXXXXXX XXXXXXXX XX strictly XXXXXXXXX.
15. XXXXXXXXX any internet platforms XXXXXXXXX XXX XXX limited at XXXXXXXXXX XXXXXXX providers, XXXXXX media platforms, blogs, XXXX XXXXX and XXXXXX for XXXXXXXX purposes XX XXXX XXXXXXXXX.
16. The XXXXXXXX traffic XXXX be monitored and XXXXXXXXXX XXXXXXX will XX XXXXXXXXX XX the I.T XXXXXXX Office.
17. The XXXXXX I.X equipment will XXXX the XXX XXXXX and XX-ROM XXXXXXX XXXXXXXX.
XX. XXXXXX XX USB XXXXX will XX granted only after a special request signed XX XXX employee&XXXXX;s direct supervisor and XXXXXXXX by XXX I.T XXXXXXX XXXXXX.
19. XXX intranet can be XXXXXXXX XXXX XXXX XXXXXXXX certificates issued by the I.X department. XXXXX employee has guaranteed XXXXXX to XXX intranet but only from XXXXXXXX equipment.
20. XXX-factor XXXXXXXXXXXXXX XXXX XX XXXX XXX special intranet levels.
XX. Security will XX addressed throughout XXX XXXXXXXXXXX XXXXXXXXXXX XXXXX.
XX. The used software XXXX XX XXXXXXXX developed or a XXXXXX build XXX by XXX external partners.
23. XXXX XXXXXXXX platform will have XXXXXX XXXXXX XXXXXXXXXXXXX to the XXXXXXXXX XXXXXXX to XXX user.
24. Each XXXXXXXX XXXX XXXX an audit XXXXX and an activity log XXXXXX, generated and XXXXXX XX other XXXXXXXXX than XXX XXXXXXXXX XXX. In XXXX way, the logs cannot XX deleted XX the XXXX XXXXXXXXX XX XXXX XXXXXXX or hacked.
XX. The XXXXXX software XXXXXXXXXXX XXX implementation cycle XXXX comply with XXX XXXXXXXX XXXXXXXXXXX.
XX. XXX internet XXX XXXXXXXX XXXXXXXX will implement XXXXXXX in the accessing equipment. Users XXXX XXXXXXXXXX XXX XXXXX that without XXXXX the XXXXXXX, the access will XX XXXX limited.
XX. XXX cookies will collect browsing information from XXX XXXXX XXX XXX purpose of XXXXXXXXX XXXXXXXX XXXXXXX XXX security XXXXXX in XXX internal I.T XXXXXXXXX.
XX. In XXX D.X.S facilities, the badge XXXXXXX will create and maintain user XXXXX XXXX. XXX internal XXXXXXXX officers XXXX be able to XXXXXX XXX XXXXX XXX XXXXXXXXX of every XXXXXXXX or visitor.
29. XXX XXXXX XXX XXXXXX XXXXXXXX in the equipment, after XXX XXXX-in XXXXXX was granted, XXXX have to XXXXXXX an online XXXXXXXX XXXXXXX. The form will XXXXXX XXXX inserting XXX XXX XXXXXX XXX the XXXXXXXX XXXX have XX write a XXXXX reason XXX XXX XXXX of XXXXX the XXX XXXXXX.
">