Responses Due: Sunday, by 11:55pm, ET Please respond to at least 2 other students. Responses should be a minimum of 150 words and include direct questions.

Rate this post
Responses Due: Sunday, by 11:55pm, ET Please respond to at least 2 other students. Responses should be a minimum of 150 words and include direct questions. Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Sources utilized to support answers are to be cited in accordance with the APA writing style by providing a general parenthetical citation (reference the author, year and page number) within your post. Refer to grading rubric for additional details concerning grading criteria.——————-**********************************************************———STUDENT #1BRANDON EGBERTThe Protected Critical Infrastructure Information (PCII) program was developed to address the concerns of the private sector in regards to the sharing of information related these sites and their associated operations. Concerning this program, what are the parts or features of this program that are effective in addressing the private sector’s concerns related to liability and protection of proprietary information?The Protected Critical Infrastructure Information Program is a vital part of ensuring the success of our homeland security and the partnerships with the private sector owners.  We have learned a lot on the past few weeks on the hesitation to share information.  This hesitation even includes agency to agency, so how much more reluctant would the private partners be?  This program in a broad stroke is to ensure the information that private sector owners share about their critical infrastructures and proprietary information that is needed to be made known for homeland security purposes do not get taken for personal gain or destruction to the company.One of the biggest features as noted in the Protected Critical Infrastructure Information program Fact Sheet is that only authorized users are allowed access to this information that is voluntarily shared by private sector owners.  These authorized users are required to complete training on the program for proper handling and safeguarding of information.  Authorized users must have a valid need to know as well as homeland security duties and/or responsibilities as well as a signed consent form. (DHS , 2018)Another part of this program that would help the private sector’s concerns are the penalties for publishing or disclosing in any inappropriate ways.  These include pretty hefty fines, removal from office and even prison time.2.In Network Fusion: Information and Intelligence Sharing for a Networked World, the author discusses (pages 8-11) the five competitive forces that shape strategy for business. Focusing upon the first of these, offer specific examples of how a privately owned business can be both a supplier and consumer of information; efforts that can have a direct impact upon homeland security intelligence and information sharing initiatives.Privately owned business can be both supplier and consumer of information in a multitude of ways.  One of the ways was addressed in the previous question.  As private sector owners provide critical information in regards to their critical infrastructure for homeland security they are supplying information that may be greatly needed in times of attack or when a threat is made and we are now faced with mitigating that threat.  In that same path this critical infrastructure may have a re-enforced network and there are reports of a hacker being able to crack through and change important information that may cause damage and/or life taking circumstances.  In this case they are a consumer of that information as well as when a fix comes into play to keep the hacker out.  These would fall into the tactical intelligence category while a threat or incident is underway.  The sharing of information is key to our success and all agencies and private sector owners need to be on the same page and willingly sharing information.References:Department of Homeland Security (2018) Protected Critical Infrastructure Information (PCII) Program Fact Sheet——————-**********************************************************———STUDENT #2Derrick Gillespie1. Protected Critical Infrastructure Information (PCII) program     The private sector naturally has concerns with sharing information with the public sector and requires protection for proprietary information. The private sector further requires assurance the voluntary information shared with the government has disclosure protections, protections from civil litigation, and liability protection. The Protected Critical Infrastructure Information (PCII) program protects private sector information that is voluntarily shared with the government for homeland security. The PII (Final Rule at 6 C.F.R Part 29) establishes procedures on the receipt, validation, handling, storage, marking, and use of critical infrastructure information submitted to the Department of Homeland Security (DHS). Only those specifically certified and authorized with permissions are privy to the shared information. (Department of Homeland Security, 2018) These protections are vital in ensuring that the private sector trusts the government with the any provided sensitive information. PCII further enhances the flow of information between private and public sectors and ensures that private sector entities will not be harmed by the loss of information provided.2.Network Fusion: Information and Intelligence Sharing for a Networked World     Suppliers and consumers possess the power to influence intelligence reporting by setting strategic requirements for intelligence. Suppliers and consumers shape intelligence to provide public value. Network fusion or fusion intelligence provides the best picture of how to deal with incidents and vulnerabilities. Strategic intelligence, operational intelligence, and tactical intelligence are used together to provide the best intelligence picture possible. (Pfeifer, 2012) An example of both a consumer and provider of information is the first responders. First responders receive information on a site they are heading to but also provide tactical information back to control stations. Control stations can then fuse received information with other information to make more informed operational or strategic decisions. Just about any private entity providing a service that includes homeland security is both a supplier and consumer of network information. Those entities that feed intelligence back into the network are providing an intelligence service that creates a system that makes the homeland less vulnerable and a hard target for terrorist attack.References:Department of Homeland Security. (2018). Protected Critical Infrastructure Information (PCII) Program. Retrieved from Homeland Security:, J. W. (2012). Network fusion: Information and intelligence sharing for a networked world. Homeland Security Affairs, 8(1) Retrieved from


Looking for a Similar Assignment? Hire our Top Uk Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15