Responses Due: Sunday, by 11:55pm, ET Please respond to at least 2 other students. Responses should be a minimum of 150 words and include direct questions. Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Sources utilized to support answers are to be cited in accordance with the APA writing style by providing a general parenthetical citation (reference the author, year and page number) within your post. Refer to grading rubric for additional details concerning grading criteria.——————-**********************************************************———STUDENT #1BRANDON EGBERTThe Protected Critical Infrastructure Information (PCII) program was developed to address the concerns of the private sector in regards to the sharing of information related these sites and their associated operations. Concerning this program, what are the parts or features of this program that are effective in addressing the private sector's concerns related to liability and protection of proprietary information?The Protected Critical Infrastructure Information Program is a vital part of ensuring the success of our homeland security and the partnerships with the private sector owners. We have learned a lot on the past few weeks on the hesitation to share information. This hesitation even includes agency to agency, so how much more reluctant would the private partners be? This program in a broad stroke is to ensure the information that private sector owners share about their critical infrastructures and proprietary information that is needed to be made known for homeland security purposes do not get taken for personal gain or destruction to the company.One of the biggest features as noted in the Protected Critical Infrastructure Information program Fact Sheet is that only authorized users are allowed access to this information that is voluntarily shared by private sector owners. These authorized users are required to complete training on the program for proper handling and safeguarding of information. Authorized users must have a valid need to know as well as homeland security duties and/or responsibilities as well as a signed consent form. (DHS , 2018)Another part of this program that would help the private sector’s concerns are the penalties for publishing or disclosing in any inappropriate ways. These include pretty hefty fines, removal from office and even prison time.2.In Network Fusion: Information and Intelligence Sharing for a Networked World, the author discusses (pages 8-11) the five competitive forces that shape strategy for business. Focusing upon the first of these, offer specific examples of how a privately owned business can be both a supplier and consumer of information; efforts that can have a direct impact upon homeland security intelligence and information sharing initiatives.Privately owned business can be both supplier and consumer of information in a multitude of ways. One of the ways was addressed in the previous question. As private sector owners provide critical information in regards to their critical infrastructure for homeland security they are supplying information that may be greatly needed in times of attack or when a threat is made and we are now faced with mitigating that threat. In that same path this critical infrastructure may have a re-enforced network and there are reports of a hacker being able to crack through and change important information that may cause damage and/or life taking circumstances. In this case they are a consumer of that information as well as when a fix comes into play to keep the hacker out. These would fall into the tactical intelligence category while a threat or incident is underway. The sharing of information is key to our success and all agencies and private sector owners need to be on the same page and willingly sharing information.References:Department of Homeland Security (2018) Protected Critical Infrastructure Information (PCII) Program Fact Sheet——————-**********************************************************———STUDENT #2Derrick Gillespie1. Protected Critical Infrastructure Information (PCII) program The private sector naturally has concerns with sharing information with the public sector and requires protection for proprietary information. The private sector further requires assurance the voluntary information shared with the government has disclosure protections, protections from civil litigation, and liability protection. The Protected Critical Infrastructure Information (PCII) program protects private sector information that is voluntarily shared with the government for homeland security. The PII (Final Rule at 6 C.F.R Part 29) establishes procedures on the receipt, validation, handling, storage, marking, and use of critical infrastructure information submitted to the Department of Homeland Security (DHS). Only those specifically certified and authorized with permissions are privy to the shared information. (Department of Homeland Security, 2018) These protections are vital in ensuring that the private sector trusts the government with the any provided sensitive information. PCII further enhances the flow of information between private and public sectors and ensures that private sector entities will not be harmed by the loss of information provided.2.Network Fusion: Information and Intelligence Sharing for a Networked World Suppliers and consumers possess the power to influence intelligence reporting by setting strategic requirements for intelligence. Suppliers and consumers shape intelligence to provide public value. Network fusion or fusion intelligence provides the best picture of how to deal with incidents and vulnerabilities. Strategic intelligence, operational intelligence, and tactical intelligence are used together to provide the best intelligence picture possible. (Pfeifer, 2012) An example of both a consumer and provider of information is the first responders. First responders receive information on a site they are heading to but also provide tactical information back to control stations. Control stations can then fuse received information with other information to make more informed operational or strategic decisions. Just about any private entity providing a service that includes homeland security is both a supplier and consumer of network information. Those entities that feed intelligence back into the network are providing an intelligence service that creates a system that makes the homeland less vulnerable and a hard target for terrorist attack.References:Department of Homeland Security. (2018). Protected Critical Infrastructure Information (PCII) Program. Retrieved from Homeland Security: https://dhs.gov/pcii-programPfeifer, J. W. (2012). Network fusion: Information and intelligence sharing for a networked world. Homeland Security Affairs, 8(1) Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1266215557?accountid=8289
Why Work with Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admission Essays & Business Writing Help
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.