Emergency Preparedness & Response
.docx
keyboard_arrow_up
School
Brookline College, Tempe *
*We aren’t endorsed by this school
Course
CJ260
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by ChancellorLyrebird410
Introduction
One of the most visible attributes of the Department of Homeland Security (DHS) is the
preparedness and response efforts that occur before, during, and after an emergency
occurs somewhere within the United States. The
Federal Emergency Management
Agency
(FEMA) is in charge of emergency preparedness and response within the DHS.
However, FEMA is not the frontline agency during an emergency.
The responsibility for emergency response and recovery begins with first responders at
the local and state levels. Ensuring a ready and able response force is vital. It lessens
the damages from natural and human-made disasters.
Federal Emergency Management Agency
Following the threat of nuclear attack during the Cold War, the Federal Emergency
Management Agency (FEMA) was created to coordinate disaster relief in 1979 (Martin,
2020). FEMA was tasked with providing emergency relief to civilians that are impacted
during a disaster or Presidential Declaration of Emergency (p.23).
The types of Presidential Declarations that FEMA responds to are natural, chemical,
biological, radiological, bombing, or mass casualty events. These types of events
involve FEMA coordination for medical, sheltering, fire management and other critical
services. An official disaster declaration is requested by the governor of the state and
requires approval from the President of the United States (DHS, 2017).
Regions of Responsibility
There are 10 geographic regions of responsibility under FEMA, which also has a
national headquarters. Each regional office is responsible for disaster relief efforts within
its assigned states and territories. Although responsible for overall federal assistance,
FEMA is limited by the authorities that govern its operations.
Most responsibilities are governed by the Robert T. Stafford Disaster Relief and
Emergency Assistance Act. This Act was signed into law on November 23, 1988. It
created the system that is in place today. In this system, a presidential disaster
declaration of an emergency triggers financial and physical assistance and gives FEMA
the responsibility for coordinating government-wide relief efforts (FEMA, 2019b).
he 10 geographic regions of responsibility under FEMA are shown in the following map:
History of the Federal Emergency Management Agency
Throughout its history, FEMA has been plagued by the various approaches to
emergency management expected by the agencies that it originally absorbed. Response
efforts gained national attention during many emergencies throughout the United States.
Examples of such emergencies are the following:
Hurricane Andrew that hit the coast of Florida in 1992
The terrorist attacks on September 11, 2001
There was a need for an integrated response to terrorism. As a result, FEMA was
incorporated into the DHS under the Homeland Security Act of 2002.
Shortly after the integration of federal offices and agencies into the DHS, FEMA was
tested again. Hurricane Katrina hit the Gulf Coast in August of 2005. Many of the
emergency response plans that were in place then at the local, state, and federal levels,
specifically in the State of Louisiana, failed. These failures proved that significant
changes needed to be made to the structure of the nation's emergency response
agencies.
There was a need for the following:
Additional training
Coordination among agencies
Increased and improved resources for assistance during an emergency
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Incident response guidelines specify an incident team's components and how they are used in an organization. What constitutes a good incident response policy?
arrow_forward
Computer Science
When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation.
arrow_forward
Cybersecurity tools are available to organizations requiring integration of their problem management, configuration management, and incident management processes.
The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cybersecurity tool.
Incident Response Plan
Incident response is a disciplined methodology for managing the aftermath of a security breach, cyberattack, or some other security incident. An incident response plan (IRP) provides an organization with procedures that effectively limit the impact on the data, system, and business and reduces recovery time and overall cost.
Research an organization from the health care, finance, or education sector.
Outline a 1- to 2-page IRP in Microsoft Word for the organization you chose. In your plan, ensure you:
Discuss roles and responsibilities.
Discuss the critical activities for each of the phases in the incident response process.…
arrow_forward
Information Systems Risk Management is the practise of identifying and evaluating dangers.
arrow_forward
Number the question
The CDC Crisis Emergency and Risk Communication (CERC) offers tools that provide practical lessons learned from emergency responses based on psychological and communication sciences (there is also an online Crisis training module, but it is currently being updated). The CERC tools are intended for public health response officials and communicators who have a basic knowledge of public health communication, working with the media and social media, and local and national response structures.
After reviewing the CERC manuals, you will be able to:
Explain Crisis and Emergency Risk Communication principles.
Describe the psychology of a crisis and the type of messages each audience needs.
Explain how to tailor messages.
Define core concepts of crisis communication planning.
Explain the roles of the media and spokesperson.
Describe the benefits of social media and mobile media devices.
Identify ways to develop relationships with stakeholders and partners.
For this…
arrow_forward
Developing a threat model is a complicated process.
arrow_forward
The Risk Management for Information Systems is the process of identifying and evaluating threats.
arrow_forward
The process of identifying and evaluating hazards is known as risk management for information systems.
arrow_forward
- A policy conundrum
Your organization has the following statements regarding phishing/social engineering in the employee manual:
All employees are required to complete annual security awareness training as provided by the Information Security team. Employees must successfully complete the training and achieve an established minimum score on any quizzes associated with the training.
The organization will conduct routine evaluations of the effectiveness security awareness training through simulated phishing tests. Employees that incorrectly identify simulated phishing emails must complete additional security awareness training and their manager will be notified. If an employee incorrectly identifies 3 or more simulated phishing emails, additional action may be taken by the employee’s manager, up to and including termination.
Employees are required to report any suspicious emails to the organization’s Information Security team using the Suspicious Mail button located in the…
arrow_forward
Identifying New Computer Viruses and Worms
Objective: Examine some current computer virus threats.
Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks
and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't
detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto
train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't
examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the
firewall is. A good place to learn about new threats is the Internet.
1. Start your Webbrowser, and go to www.us-cert.gov.
2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the
GObutton. WhatOSsareaffected bythis worm?
3.…
arrow_forward
Management of risks in an information system entails spotting and
evaluating possible dangers.
arrow_forward
Computer Science
the systems capabilities to meet regulatory requirements by judging the technologies that relate to electronic signatures, data correction, and audit logs.
arrow_forward
Distinguish between passive and active dangers.
arrow_forward
Launch versions of operating systems and apps often include bugs. Multiple thousands of bugs have been found in popular application frameworks. When a problem is found in a piece of software, the manufacturer usually has a patch available for sale (also known as patches). The day after a new vulnerability is disclosed, criminals launch zero-day assaults. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Security fixes should be installed on a regular basis.
arrow_forward
Break down what happens during system maintenance and protection.
arrow_forward
Security incident response plans should avoid theft and security breaches.
arrow_forward
Any organization or business that has had to deal witha cyber breach understands the stress that accompanies the process, no matter
how well prepared or rehearsed it is for cyber events. All breaches come with a unique set of challenges and requirements. An incident
response team often referred to as an IRT, is a team of individuals who are available, are ready, and have the expertise to investigate a
data breach. IRT must understand the full scope of the breach to contain it, which typically includes understanding the entire life cycle of
the attack. Forensic specialists can provide valuable information to the rest of the IRT team by examining logs, traffic, and systems to
gain insight on the full scope of a breach. Discuss what the forensics investigators need to identify to understand how to scope the data
breach incident.
arrow_forward
With the aid diagram shows several standard steps to be taken when an incident occurs
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Related Questions
- Incident response guidelines specify an incident team's components and how they are used in an organization. What constitutes a good incident response policy?arrow_forwardComputer Science When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation.arrow_forwardCybersecurity tools are available to organizations requiring integration of their problem management, configuration management, and incident management processes. The CEO and CIO need you and your team to create an IRP and change management plan. These plans will help the organization choose the appropriate cybersecurity tool. Incident Response Plan Incident response is a disciplined methodology for managing the aftermath of a security breach, cyberattack, or some other security incident. An incident response plan (IRP) provides an organization with procedures that effectively limit the impact on the data, system, and business and reduces recovery time and overall cost. Research an organization from the health care, finance, or education sector. Outline a 1- to 2-page IRP in Microsoft Word for the organization you chose. In your plan, ensure you: Discuss roles and responsibilities. Discuss the critical activities for each of the phases in the incident response process.…arrow_forward
- Information Systems Risk Management is the practise of identifying and evaluating dangers.arrow_forwardNumber the question The CDC Crisis Emergency and Risk Communication (CERC) offers tools that provide practical lessons learned from emergency responses based on psychological and communication sciences (there is also an online Crisis training module, but it is currently being updated). The CERC tools are intended for public health response officials and communicators who have a basic knowledge of public health communication, working with the media and social media, and local and national response structures. After reviewing the CERC manuals, you will be able to: Explain Crisis and Emergency Risk Communication principles. Describe the psychology of a crisis and the type of messages each audience needs. Explain how to tailor messages. Define core concepts of crisis communication planning. Explain the roles of the media and spokesperson. Describe the benefits of social media and mobile media devices. Identify ways to develop relationships with stakeholders and partners. For this…arrow_forwardDeveloping a threat model is a complicated process.arrow_forward
- The Risk Management for Information Systems is the process of identifying and evaluating threats.arrow_forwardThe process of identifying and evaluating hazards is known as risk management for information systems.arrow_forward- A policy conundrum Your organization has the following statements regarding phishing/social engineering in the employee manual: All employees are required to complete annual security awareness training as provided by the Information Security team. Employees must successfully complete the training and achieve an established minimum score on any quizzes associated with the training. The organization will conduct routine evaluations of the effectiveness security awareness training through simulated phishing tests. Employees that incorrectly identify simulated phishing emails must complete additional security awareness training and their manager will be notified. If an employee incorrectly identifies 3 or more simulated phishing emails, additional action may be taken by the employee’s manager, up to and including termination. Employees are required to report any suspicious emails to the organization’s Information Security team using the Suspicious Mail button located in the…arrow_forward
- Identifying New Computer Viruses and Worms Objective: Examine some current computer virus threats. Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the firewall is. A good place to learn about new threats is the Internet. 1. Start your Webbrowser, and go to www.us-cert.gov. 2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the GObutton. WhatOSsareaffected bythis worm? 3.…arrow_forwardManagement of risks in an information system entails spotting and evaluating possible dangers.arrow_forwardComputer Science the systems capabilities to meet regulatory requirements by judging the technologies that relate to electronic signatures, data correction, and audit logs.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,