solved Evaluate: What are different kinds of insider threats to our
Evaluate:
What are different kinds of insider threats to our US cyber security?
What mitigation efforts can help address this concern?
Does corruption and cyber infrastructure have anything in common? What are they and what can be done to help address this concern?
Conclude with a research or policy question for further research.
Part 2 of 2 (refer to Week 4 Readings in the Lessons for Week 4)
1) How does social media assist emergency management. Give examples.      2) How does social media hinder emergency management. Give examples.      3) How can emergency management officials help assist with providing relevant and detailed information about              public health concerns?
Conclude with a research or policy question.
Week 3 Assignments
Reading Assignment
CISA. (n.d.). Insider threat mitigation. https://www.cisa.gov/insider-threat- 4 mitigation
DHS. (n.d.). Insider threat.
Part 1 Week 3 Reading
Read:
Innovative uses in Social Media https://www.dhs.gov/sites/default/files/publications/Social-Media-EM_0913-508_0.pdf
IS-0042: Social Media in Emergency Management https://emilms.fema.gov/is_0042/curriculum/1.html
Looking for an Assignment Help? Order a custom-written, plagiarism-free paper
