Preview 50% of the Answer Below
Answer Preview
A. Introduction
1
No |
Title |
Brief Description |
1 |
Customs and Border Protection |
Guarding and controlling the border entry points. |
2 |
Immigration and Customs Enforcement |
Customs service and law application for every visitor or possible immigrant |
3 |
Citizenship and Immigration Services |
Processing requests from immigrants and citizenship applicants. |
4 |
XXXXXXXXXXXXXX XXXXXXXX Administration |
Implementing XXX supervising XX transport safety and XXXXXXXX measures |
X |
Federal XXX Enforcement XXXXXXXX XXXXXX |
Preparing, XXXXXXXXX and XXXXXXXXXX professionals XXXXXXX for XXX DHS |
X |
Federal XXXXXXXXX Management XXXXXX |
Civil protection in case XX real-time XXXXXXXXX XXX natural XXXXXXXXXX threats |
X |
Science & Technology XXXXXXXXXXX |
XXXXXXXXXX XXXXXXXX plans XXX XXXXXXXX the XXXXXX XXXXXXX XXXXX attacks. |
X |
Office of Cybersecurity XXX XXXXXXXXXXXXXX in XXX National XXXXXXXXXX and Programs Directorate |
Implementing security XXXXXXXX and measures in cases XX XXXXX attacks. |
X |
XXXXXX of XXXXXXXXXXXXXX Protection |
XXXXXXXXXX the major infrastructure in the XXXXXXXXX. |
10 |
Office XX Operations XXXXXXXXXXXX |
Measuring terrorist threat XXXXXX on a daily XXXXX XXX XXXXXXX the other XXXXXXXXXXX informed about it. |
XX |
XXXXX Guard |
Guarding the XXX borders XX XXXXXX States |
12 |
Secret XXXXXXX |
Intelligence XXXXXXXXXX XXXXXXX for detecting and preventing terrorist cells |
X. The XXXXXXXX and XXXXXXXXXX of the current issue XX XXX XXXXXXXX XXXXXX XXXXXXXXX:
X.3.X XXX information XXXXXXXX policy XXX a unitary XXXXXX and XXXXXXXXX, applicable XXX all XXX agencies and offices.
1.3.X The security policy framework XXX an XXXXXX XXXXXXXXXXXXXX XXXXXXXXXXX for XXXXX XXXXXXXX. If XXXX terms XXXX be considered as XXX technical, a XXXXXXXX will XX presented.
X.3.X XXX XXXXXXXXX will have XX XXXXXXXXXXX XXX implement XXX current issue XX the security XXXXXX. XXX former regulations, rules, XXX XXXXXXXXXX XXXX XXXXXX obsolete.
X.X.4 This XXXXXX XXXX also XXXXXXX XXXXXXXX applicable for XXXXXXXX organizations XXX partners that will XXXX at XXXX point to XXXXXX XXX IT or XXXXXXXXXXXXX infrastructure.
1.3.5 This XXXXXXXX XXXXXX will XXXXXXX national and international regulations in It XXXXXXXX and it XXXX XXXX XX building a best XXXXXXXX XXXXX for the entire public-XXXXXXX institutions, XXXX outside XX XXX XXXXXXXXXXX XXXXX.
X.X.6 XXXX current XXXXX will improve XXX XXXXXXXX security regarding the XXXXX of the IT infrastructure XXX it is XXXXXXXX to improve overall XXXXXXXXXX in XXXXX.
X. The XXXXXXXXX Core
XXX XXXXXXX Framework Core XXXX XXXXXXX XXX XXXXXXXX activities in order XX XXXXXX with XXX cybersecurity expectations with an explicit XXXXXXXXXXXX XX how XX achieve the XXXX compliance. D.H.S Framework Care XXX four components: XXXXXXXXX, XXXXXXXXXX, Subcategories XXX Informative XXXXXXXXXX. The dedicated document will XX XXXXXXX XXXXX XXX following model:
Images Not Shown
• XXXXXXXXX XXX XXX XXXX XXXXXXXXX cybersecurity XXXXXXXXXX. XXX XXXXXX XXXXXXXX protection XXXX XX oriented around XXXXX functions. Here are XXX functions: Identify, XXXXXXX, XXXXXX, Respond, XXX Recover. XXXXXXXX XXXX management XXXXXXXXX, XXX key XXXX XX these XXXXXXXXX XXX XX deducted XXXX XXX title. XXX XXXXX function has to identify XXXXXXXXX threats with XXXXXXXXX and XXXXXXXX XXXXXXXX. XXX second function XXX to XXXXXXX XXX internal I.X XXXXXX from XXX D.X.S agencies XXX XXXXXXX.
&XXXX; Categories are the subdivisions XX a XXXXXXXX XXXXXXX into XXXXXXXXXX and outcomes. The XXXX purpose of the categories XX XX explain how XXXX main function XXX be fulfilled.
7
• XXXXXXXXXXXXX are a more XXXXXXXX perspective XX the categories, XXXX XXXXX XXXXXXXXXX XXX actions XXXX need implementation in order XX XXXXXXX XXX XXXXXXXXXX.
• Informative XXXXXXXXXX are a set of standards, guidelines XXX XXXXXXXX XXXXXXXXXXX XXXXXXXX legal or technical XXXXXXXXXX XXX XXX objectives and XXX XXXXXXXXXXXXX XXXXXXXXXX.
XXXX XXXXXXXXXX:
3. XXXXXXX implementation: XXX current I.T XXXXXX XXXX be XXXXXXXXXX by the XXXXX Technology Officer. Future revisions and XXXXXXX XXXX XX submitted to the Chief XXXXXXXXXX XXXXXXX.
4. XXXXXXXXXXX evaluation: XXX overall performance XX each XXXXXXXXXX and XXXXXXX XXXX XX XXXXXXXX XX XXX I.X Quality Office.
5. Incompatibility XXXXXX: Any XXXXXXXXXXXXXXX XXXXX XXXXXXXXX XXX XXXXXXX XXXXXXXXX XXXX XX XXXXXXXX XX XXX I.T XXXXXXX XXXXXX.
X. External XXXXXXXX XXXX XXXX to comply XXXX the internal XXXXXXXX XXXXXX.
7. External XXXXXXXX will be considered XX contributors to the internal security policy XXX I.T security agreements will XX XXXXXX.
XXXXXXXXXX and XXXXXX XXXXXXXX:
The XXXXXXX of the current Protection XXXXXXXX is XX protect XXX XXXXXXXXXXXXXXX, Availability, and XXXXXXXXX of XXX XXXXXX and XXXXXXXXX.
8. The employees XXXX XXXXXXX a badge XX their enrollment from the XXXXXXXX XXXXXXXX XXXXXX. XXX badge XXX XXXXXXX access in XXX DHS buildings and XX systems, XXXXXXXXX XX their corresponding responsibilities.
X. XXX badge can XXXX use by XXX corresponding XXXX. Using badges XXXX other colleagues, even if XXXX hold an equal XXXXXXXX, XXXX or XXXXXXXXXXXXXX, XX strictly XXXXXXXXX.
XX. XXXXXXXX XXXX XXX a visitor badge with limited XXXX and XXXXXX levels.
11. Security XXXXXX, direct and indirect supervisors XXXX XXX XXXXX to XXX and XXXXX a XXXXX, every time XXXX consider so.
XX. XXXXXXXX XXXXXX cannot leave their XXXXXXXX perimeter, XXXXXX cases of XXXX XXXXXXXXXXX.
13. Data protection measures will be enforced XXXX the purpose of controlling the flows XX XXXXXXXXXXX.
XX. Using the I.X XXXXXXXXX in order XX access websites in XXXXXXXX XXXXXXXX XX strictly XXXXXXXXX.
15. XXXXXXXXX any internet platforms including XXX not limited XX XXXXXXXXXX content providers, XXXXXX XXXXX XXXXXXXXX, XXXXX, XXXX XXXXX and XXXXXX XXX personal purposes is also XXXXXXXXX.
16. XXX internet XXXXXXX XXXX XX monitored and XXXXXXXXXX XXXXXXX will be extracted XX the I.T Quality Office.
17. The entire I.T XXXXXXXXX XXXX have XXX USB XXXXX XXX XX-XXX drivers disabled.
XX. XXXXXX to USB plugs will be XXXXXXX only XXXXX a XXXXXXX request signed XX the employee’s XXXXXX supervisor XXX approved XX XXX I.X XXXXXXX Office.
XX. XXX XXXXXXXX XXX XX XXXXXXXX XXXX with security certificates issued by XXX I.X department. XXXXX employee XXX XXXXXXXXXX access XX the intranet XXX only from approved equipment.
20. XXX-XXXXXX XXXXXXXXXXXXXX XXXX be used for special intranet levels.
XXXXXXXXX XXXXXXXX
21. Security will be XXXXXXXXX XXXXXXXXXX the XXXXXXXXXXX Development cycle.
XX. XXX XXXX software XXXX XX internal XXXXXXXXX or a custom build one XX the XXXXXXXX partners.
XX. Each XXXXXXXX platform will have XXXXXX XXXXXX XXXXXXXXXXXXX to XXX privilege XXXXXXX to the user.
24. XXXX XXXXXXXX XXXX XXXX an audit trail and an XXXXXXXX XXX XXXXXX, generated XXX stored XX other XXXXXXXXX XXXX the XXXXXXXXX XXX. In this XXX, XXX XXXX XXXXXX XX XXXXXXX XX XXX XXXX equipment is risk XXXXXXX or XXXXXX.
25. XXX entire XXXXXXXX development XXX XXXXXXXXXXXXXX XXXXX XXXX comply XXXX XXX national regulations.
26. DHS internet XXX XXXXXXXX websites will implement cookies in the accessing XXXXXXXXX. Users must XXXXXXXXXX and agree XXXX without XXXXX the XXXXXXX, the access XXXX be XXXX XXXXXXX.
27. The cookies XXXX collect browsing XXXXXXXXXXX from XXX users XXX XXX XXXXXXX of detecting XXXXXXXX threats and XXXXXXXX issues in XXX XXXXXXXX I.X XXXXXXXXX.
XX. In the D.H.S facilities, the badge readers XXXX XXXXXX and maintain XXXX XXXXX XXXX. The internal XXXXXXXX officers XXXX be able XX XXXXXX XXX track the itinerary XX every employee or visitor.
29. XXX XXXXX XXX XXXXXX inserted in XXX XXXXXXXXX, after XXX XXXX-in XXXXXX XXX granted, will have XX XXXXXXX an online security XXXXXXX. The form will appear XXXX inserting XXX XXX device XXX the XXXXXXXX XXXX have to XXXXX a brief XXXXXX for the XXXX of using XXX XXX device.
">