1. Discuss how Risk Assessment plays a significant role in infrastructure Assets inventory and costs. As a good example to segue into the infrastructure defense is “Operation Iraqi Freedom, DHS launched Operation Liberty Shield, it was the national plan to defend the infrastructure and ensure continuance commerce” (Newsome & Jarmon, 2016, p. 367).
2. Discuss Insider Threats and the official advice for managing these threats issued by the U.S. Office of the National Counterintelligence Executive (Newsome & Jarmon, 2016). You should explain and justify the use of one specific counterintelligence technology that is effective against the infiltration of malicious software in a computer network system. The justification should also include the cost-effective approach to using that particular counterintelligence strategy and software.
3. Discuss Three Major Terrorist Attacks on Aviation around the world. Discuss the difficulties that security and defense professionals encounter when they attempt to institute state of the art security measures at the airports around the world as they try to engage and work with government officials in other countries; a collaborative challenge with different and long-distance partners.
4. Discuss How Legal and Illegal Immigration Impacts the National Security of the United States. It’s important to discuss the scope of border security to first understand the concepts of illegal immigration. Moreover, a risk management and assessment of legal and illegal immigration and border security will provide the necessary data and information to complete the report with all the information necessary to offer a comprehensive conclusion.