Introduction to Email Copywriting Email copywriting is the art of crafting compe

Introduction to Email Copywriting
Email copywriting is the art of crafting compe

Introduction to Email Copywriting
Email copywriting is the art of crafting compelling email content to effectively communicate with subscribers and achieve specific business goals.
Importance of Email Copywriting
Builds relationships with the audience
Drives traffic, leads, and sales
Increases brand awareness and loyalty
Strategies for Effective Email Copywriting
Understand the audience: Analyze customer personas, interests, and needs.
Define clear objectives: Set measurable and achievable goals.
Create engaging content: Follow a proven email copywriting formula.
Essential Elements of Email Copy
Subject Lines and Preheader:Grab attention and encourage opens
Clearly communicate the email’s purpose
Use personalization tactics
Hook, Value, and Offer:A captivating hook to engage readers
Intriguing value proposition
Persuasive offer to promote specific actions
Introduction to Hook and Value:The hook: the first words in an email
Present a relatable problem and follow with the solution
Creating Effective Offers:Highlight pricing and discounts
Make them stand out with fonts, colors, and positioning
Including Calls to Action and Salutations:Use strong, action-oriented verbs
Make buttons visually appealing
Personalize greetings when possible
Utilizing ADS Open Courses Platform
ADS Open Courses platform offers free email marketing resources and video lessons to learn effective email templating, writing, sending, and tracking. Capitalize on this education hub to boost your business growth.
Sources
Email Marketing Industry Census 2021 Report (https://econsultancy.com/email-marketing-industry-census/)
OptinMonster blog: How to Write the Perfect Marketing Email (https://optinmonster.com/how-to-write-perfect-marketing-email/)
Copyblogger 10 Tips for Writing Emails Your Subscribers Will Open (https://copyblogger.com/opening-email-newsletters/)

Research Report on Contemporary Topics in Software Security Choose one of the li

Research Report on Contemporary Topics in Software Security
Choose one of the li

Research Report on Contemporary Topics in Software Security
Choose one of the listed topics and prepare a formal research report.
Topic 1: Code-Level Attacks in the Metaverse
Objective:The purpose of this assignment is to conduct an in-depth analysis of code-level attacks that are relevant to the Metaverse. You will explore various types of attacks, their mechanisms, potential impacts, and mitigation strategies. The goal is to provide a comprehensive understanding of how these attacks can compromise the security of Metaverse environments and how they can be prevented or mitigated.
Guidelines:Introduction:Provide an overview of the Metaverse, its components, and the significance of security in this digital environment.
Briefly outline the focus of the report on code-level attacks.
Types of Code-Level Attacks:Identify and describe at least five different types of code-level attacks relevant to the Metaverse.
Include examples and scenarios for each attack to illustrate how they can be executed within Metaverse applications.
Detailed Analysis:For each identified attack, provide a detailed explanation of its mechanism.
Discuss the potential impact of these attacks on the Metaverse, including data breaches, unauthorized access, and system disruptions.
Highlight any notable real-world incidents or case studies where such attacks have been observed.
Mitigation Strategies:Explore various mitigation strategies and best practices to prevent or reduce the risk of code-level attacks in the Metaverse.
Discuss the role of secure coding practices, input validation, encryption, and other technical measures.
Include recommendations for developers and security professionals working on Metaverse applications.
Conclusion:Summarize the key points discussed in the report.
Emphasize the importance of addressing code-level security threats in the Metaverse.
Provide final thoughts on future directions for research and development in this area.
References:Include a list of references and citations for all sources used in the report.
Ensure that your references are from credible and relevant academic or industry sources.
Deliverables:A well-structured research report with justified text alignment, covering the points outlined in the guidelines.
The report should be approximately 3000-4000 words in length.
Use appropriate headings and subheadings to organize the content.
Include diagrams, code snippets, and tables where necessary to enhance understanding.
Submission Requirements:Submit the report in PDF format.
Ensure that the document is properly formatted and free from grammatical errors.
Cite all sources using a consistent citation style (e.g., APA, IEEE).
Evaluation Criteria:Depth and accuracy of research on code-level attacks.
Clarity and coherence of explanations and analyses.
Practicality and relevance of mitigation strategies.
Quality of writing, formatting, and presentation.
Proper use of references and citations.
Topic 2: Code-Level Attacks in Quantum Computing
Objective:The aim of this assignment is to conduct a thorough investigation into the nature and implications of code-level attacks specific to quantum computing. You will explore various types of attacks, their methodologies, potential impacts, and strategies for mitigation. This report will provide a comprehensive understanding of the unique security challenges posed by quantum computing and how they can be addressed to protect quantum systems and applications.
Guidelines:Introduction:Provide an overview of quantum computing, its principles, and its significance in advancing computational capabilities.
Briefly outline the focus of the report on code-level attacks specific to quantum computing environments.
Types of Code-Level Attacks:Identify and describe at least five different types of code-level attacks relevant to quantum computing.
Include examples and scenarios for each attack to illustrate how they can be executed within quantum computing systems.
Detailed Analysis:For each identified attack, provide a detailed explanation of its mechanism.
Discuss the potential impact of these attacks on quantum computing, including data corruption, unauthorized access, and computational disruptions.
Highlight any notable real-world incidents or theoretical studies where such attacks have been observed or predicted.
Mitigation Strategies:Explore various mitigation strategies and best practices to prevent or reduce the risk of code-level attacks in quantum computing.
Discuss the role of quantum-safe cryptography, error correction, and secure quantum algorithms.
Include recommendations for researchers, developers, and security professionals working on quantum computing applications.
Conclusion:Summarize the key points discussed in the report.
Emphasize the importance of addressing code-level security threats in quantum computing.
Provide final thoughts on future directions for research and development in this area.
References:Include a list of references and citations for all sources used in the report.
Ensure that your references are from credible and relevant academic or industry sources.
Deliverables:A well-structured research report with justified text alignment, covering the points outlined in the guidelines.
The report should be approximately 3000-4000 words in length.
Use appropriate headings and subheadings to organize the content.
Include diagrams, code snippets, and tables where necessary to enhance understanding.
Submission Requirements:Submit the report in PDF format.
Ensure that the document is properly formatted and free from grammatical errors.
Cite all sources using a consistent citation style (e.g., APA, IEEE).
Evaluation Criteria:Depth and accuracy of research on code-level attacks.
Clarity and coherence of explanations and analyses.
Practicality and relevance of mitigation strategies.
Quality of writing, formatting, and presentation.
Proper use of references and citations.
just one topic

Select a cyber security paper that has been published in a reasonably reputable

Select a cyber security paper that has been published in a reasonably reputable

Select a cyber security paper that has been published in a reasonably reputable forum (e.g., journal, magazine, conference). If you are having trouble, you can discuss with your instructor. Try to pick an article that resonates with your background and interests. Write a 1500-2000 word essay describing the paper with emphasis on this: (1) What is the primary message in the paper? (2) What are the consequences of this paper and its message on the cyber security industry? (3) What would you recommend as important next steps and follow-on work in our industry as a result of this paper?

Purpose Learners will create a travel journal or log about an imaginary trip the

Purpose
Learners will create a travel journal or log about an imaginary trip the

Purpose
Learners will create a travel journal or log about an imaginary trip they take back in time to a period, region, and culture studied during this course to assess students’ ability to describe the significance of cultural achievements of Western Civilizations.
Description
Students will create a travel journal about their travels back to one of the cultures or societies studied in the course and write about the sites and events that they visited. The journal can be presented in a digital format such as a website, blog, social media posting series, or storyboard.
Important: Travel Logs created using Word or PowerPoint will not be accepted for grading. See media options below.
Details
1. Students must choose a minimum of 5 sites or events from a single culture or society.
Examples of site: monuments, temples, churches, castles, famous marketplaces, battlefields, statues, painters’ workshops, taverns, etc.
Example of events: gladiator fights, dinner parties, sermons, receptions, parades, religious festivals or ceremonies, marriage ceremonies, etc.
2. Students will use at least 10 sources (5 primary, 5 secondary) to research how the sites were constructed and used by the societies, what events took place at these locations, and the significance of these events and monuments for the culture visited.
Pay attention to descriptions and images of the monument or site
Be sure to understand the society that site, or event was relevant to
Consider who might visit such a site. What types of people might the traveler encounter?
Imagine what sounds, smells, conversations the traveler might overhear.
Acceptable Primary and Secondary Sources include but are not limited to:
Primary sources (court records, memoirs/autobiographies, letters, artifacts, etc.)
Print secondary sources
Scholarly journals
Newspaper and other media and video archives
Appropriate history-related websites and databases (not Wikipedia)
Historical documentaries
History textbooks
Please contact a NOVA librarian or your instructor if you have questions on locating sources.
3. Students will submit an annotated bibliography in Module 5
4. Descriptions of the 5 sites or events should be at least 300-500 words for each site or event presented. The descriptions should accurately demonstrate the cultural achievements and significance of the society studied and presented.
Consider utilizing photos of the site or an event that may have been similar to help illustrate your narrative
5. The student will present their travel narrative and descriptions of location, along with any accompanying images (properly label and cited) on a digital platform of their choice. Here are some options:
Google sites
Blogger
Wix
Weebly
WordPress
Tumblr
TravelDiaries
Important: If you choose to create a website, make sure that you make your website publicly accessible or the instructor won’t be able to access it for purposes of grading. Do not make it private or require a password for access. Some website creation sites, such as Wix, require you to “publish” your site before other can view it. (In the case of Wix and likely the others, you need to remember to “publish” after all of your edits, no matter how minor.)
If you know of another site or application you would like to use, please get approval from the instructor.
Grading
This assignment is worth 100 points and 25 percent of your overall final grade (along with the Final Project Proposal). When you have completed your project, you will submit it here: Final Project: SUBMIT HERE
Rubric
Category OutstandingVery GoodAveragePoor
Thesis
20 Points
The purpose of the project is clear. The audience has a clear idea of the point of the project.The purpose of the project is relatively clear. The audience may have a relative idea of the purpose of the project, but may have to infer somewhat.The purpose of the project is relatively clear, though the audience may have to infer or use contextual clues. There is some vagueness in the presentation or cohesion of the project.The purpose of the project is obscure. The audience has little understanding of what is the point of the presentation.
Subject Knowledge and Perspective
40 Points
The quality of the project exhibits expert knowledge and accuracy of the historical figures, events, and/or eras. The perspective (or point of view) is realistic and research-based.
The quality of the project exhibits near expert knowledge and accuracy of the historical figures, events, and/or eras. The perspective (or point of view) is mostly realistic and research-based.The quality of the project exhibits some expert knowledge and accuracy of the historical figures, events, and/or eras. The perspective (or point of view) is somewhat realistic and research-based.The quality of the project exhibits little expert knowledge and accuracy of the historical figures, events, and/or eras. The perspective (or point of view) is not realistic nor research-based.
Sources
20 Points
The sources used were appropriate and added substantial research and information to the project. At least five primary sources and five secondary sources were used.
The sources used were mostly appropriate and added strong research and information to the project. At least four primary sources and four secondary sources were used.The sources used were somewhat appropriate, but only added mediocre research and information to the project. Fewer than four primary sources and four secondary sources were used.The sources used were not always appropriate and added little research and information to the project. Fewer than four primary sources and four secondary sources were used.
Overall Production, including Writing
20 Points
The project exhibits outstanding evidence of clear and creative originality.
For the multimedia projects (videos, websites, etc.), the design and technical aspects are of high professional quality and help provide for an accurate portrayal of the historical era. All written aspects of the project are of high professional quality.
The project exhibits very strong evidence of clear and creative originality.
For the multimedia projects (videos, websites, etc.), the design and technical aspects are of very high professional quality and help provide for a mostly accurate portrayal of the historical era. All written aspects of the project are of very high professional quality.
The project exhibits average evidence of clear and creative originality.
For the multimedia projects (videos, websites, etc.), the design and technical aspects are of average professional quality and help provide for a somewhat accurate portrayal of the historical era. The written aspects of the project were inconsistent and did not always meet the level of high professional quality.
The project exhibits little evidence of clear and creative originality.
For the multimedia projects (videos, websites, etc.), the design and technical aspects did not meet the level of professional quality, and failed to provide an accurate portrayal of the historical era. The written aspects of the project were below average and did not meet the level of high professional quality.

You must write a 4-6 page term paper on a topic of your choice related to Cyber

You must write a 4-6 page term paper on a topic of your choice related to Cyber

You must write a 4-6 page term paper on a topic of your choice related to Cyber Security (ALL TOPICS MUST BE APPROVED). Please write the term paper in a Word document and then upload it for grading.
Your term paper outline is due at the end of Week 2.
Your term paper is due at the end of Week 8.
In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
Papers will automatically be submitted to www.turnitin.com for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A SIGNIFICANT POINT REDUCTION.
PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

Hello! For this assignment, I have a challenge essay for anyone interested. I

Hello!
For this assignment, I have a challenge essay for anyone interested.
I

Hello!
For this assignment, I have a challenge essay for anyone interested.
I have to write about my internship experience this summer. For obvious reasons, I won’t share my company, but for the essay, you can say the company was “PWC” and that I was a cybersecurity intern.
I have also included another screenshot that shows what we did on a week-to-week basis. I will provide details for each week so you have some content to work with.
Week 1 (May 20th) Orientation and Setup: This week was pretty easy and light by meeting everyone, and going over our background such as grade, major, and interest. Then we went over more important items such as the employee handbook, expectations, onboarding process, and completing any outstanding forms. To get the ball rolling, we started downloading what we needed for the duration of the internship. This included downloading VMware Fusion and Microsoft Remote Desktop as I am a Mac user. We downloaded 3 machines which were Ubuntu, Microsoft Windows, and Kali Linux.
Week 2 (May 27th) Virtualization concepts and VMware Configuration: This was the first week our Deliverable would be due. this was just an extension of the first because the support staff wanted to make sure we got the initial steps correct and understood how to provision another virtual machine if needed
Week 3 (June 3rd) Command Line to configure machines: This week we were using the command line interface (CLI) to Configure machines. I found this assignment to be fun because I like working in the CLI. We used commands to make move and delete files, create move-through and destroy directories, use “sudo” to elevate to root privileges, and learn how to read and look for files. From this assignment, I learned a lot of new commands that I didn’t know existed. I also learned that the commands from Windows Powershell and Linux Shell are a little bit different from each other.
Week 4 (June 10th) using infrastructure as Code: Up until this assignment we have been creating instances one by one. With infrastructure as code or Terraform, We were tasked with deploying multiple instances at once with Terraform. I learned that Terraform is used for automation and deployment. With the terraform code, I kept the file and used it to deploy more instances in my other deliverables. At first, looking at all the code, I was lost but after watching a few videos, I got a good understanding of it and wanted to learn more
Week 5 (June 17th) Cloud networking: This week was another fun week working in the command line to SSH and telnet from one machine to the other and essentially having both machines (kali Linux and Ubuntu machines) talk to each other. We did this by running the “ifconfig” to grab my Inet/IP address. with the IP address, we were then able to SSH into the different machines after opening port 22 to establish a secure connection. The reason for this deliverable was to understand the difference between SSH and Telnet. We then did the same thing but instead of SSH, we used Telnet. The process was pretty much the same but we used wireshark to capture all the traffic and we could see that with SSH, more encryption and security was offered. On the flip side of things, Telnet doesn’t offer much security and can be vulnerable to leaks.
Week 6 (June 24th) Host-based Firewalls: For this week we started out using Windows Powershell along with Windows Defender and Kali Linux. We first blocked all traffic on Windows and tried to find it using Kali, we got an error message saying that the Windows machine was down which is what is supposed to happen when we block all incoming traffic. After that, we allowed all traffic and we were able to find the Windows machine.
From this Internship, I gained a lot of exposure to content that wasn’t available to me as a student. I experienced real work will be outside of school. One of the difficulties I experienced was not knowing what to do if something went wrong or something didn’t work as it was supposed to. To overcome this, I would look at the instructions and make sure I understood them, if that didn’t work, I would watch YouTube videos and use open-source research to figure out what to do next. Most of the time that ended up working out but on the off chance it didn’t, I could ask my fellow peers and or support staff.
One of the unexpected things I learned is that the material isn’t that hard when your activity listening to the support staff when they demo and watching YouTube videos. There is a lot of support the hard part is just sitting down and studying the material.
The number 1 highlight for me was learning a lot of material that I can carry into my senior and or post-graduation life. and also connecting with fellow interns and bonding over Nerdy IT stuff.
This paper should be 5-7 pages.
Absolutely NO use of any AI.
Also, everything should tie into the program’s objectives which are
Information Systems and Network Security
Leveraging the Command Line Interface (CLI)
Infrastructure as Code Using Terraform
Technology Fluency
Problem-Solving
If you have any questions, please don’t hesitate to reach out! ?

https://docs.google.com/presentation/d/1koIKRiZdvz… Part1 This is a discussion

https://docs.google.com/presentation/d/1koIKRiZdvz…
Part1
This is a discussion

https://docs.google.com/presentation/d/1koIKRiZdvz…
Part1
This is a discussion board limit to your team. Make three separate posts to share with them. In one post, list three keywords you found in the reading. Provide three things: (1) the keyword, (2) your definition of it, and (3) why you believe it is important.
In another post, pose two open-ended questions you have about this topic.
Stretch your own understanding. Ask a question that you can’t answer. Open-ended questions are complex questions that (1) get people talking, (2) cannot be answered with “yes” or “no” or a single word or short phrase, (3) may be provocative or controversial, and (4) cannot be answered with a simple search of the internet.
In another post, complete two sentence stems, making connections to your personal experiences, with enough detail to show that you can apply the current topics to your life experience. Suitable sentence stems are like the following: “This is like when…”, or “This remind me of…”Part2
Discussion 1 :
List at least four data types we use in MySQL, and also discuss the meaning of each data type.
Part 3
Disscussion 2:
Find an article that talks about the vulnerabilities and security issues of database
Write a short summary including your opinion

Assignment Details: In this assignment, your task is to formulate a clear proble

Assignment Details:
In this assignment, your task is to formulate a clear proble

Assignment Details:
In this assignment, your task is to formulate a clear problem statement and research objectives. The problem statement is to be based on the literature review (LR) you conducted in Assignment 1.
A good problem statement should contain the following:
Identify the problem domain.
Describe the problem.
Highlight the Significance
Mention existing solutions.
Justify the need for research.
Ensure to provide in-text citations
Note: refer to “Steps for formulating research problem with examples” in PPT to guide you on how to formulate research problem
A good Research objective contain the following:
Clearly state the primary goal of the research, followed by the objectives required to achieve this goal. Each objective should begin with “To…”. For example, “To propose,” “To design.”
Ensure that the research objectives are aligned with the problem challenges identified in the problem statement.
Note: Refer to the “Formulate objectives: Example” in the PowerPoint presentation to guide you on how to formulate research objectives.
Deliverables:
Your submission should include a report that comprises the research title, problem statement, research objectives, and literature review. The research title and literature review were covered in Assignment 1. Therefore, in this assignment, students need to combine them.

Introduction to Homeland Security and Defense: Analysis of Risk Management and Cyber Security

Introduction to Homeland Security and Defense: Analysis of Risk Management and Cyber Security

The United States homeland security environment is complex and filled with competing requirements, interests, and incentives that must be balanced and managed effectively to ensure the achievement of key national objectives. The key objective of applying risk management is to build security, safety, and resiliency into all aspects of Homeland Security planning. How does the Department of Homeland Security decide exactly what needs protecting and to what level the protection shall be? It all starts with the risk assessment formula and properly applying risk management principals.

Risk management plays a role in Homeland Security due to the wide array of threats and hazards out there. There is an ongoing debate about where we should direct our attention to (high probability/low consequence or low probability/high consequence) and where limited resources should be directed. This is something that DHS deals on a regular basis. First, Risk management is “the process of identifying, analyzing, and communicating risk and accepting, avoiding, transferring, or controlling it to an acceptable level considering associated costs and benefits of any actions taken. (DHS) The key principles for effective risk management includes Unity of Effort, transparency, adaptability, practicality, and customization. The safety, security, and resilience of the Nation are threatened by an array of hazards, including acts of terrorism, malicious activity in cyberspace, pandemics, manmade accidents, transnational crime, and natural disasters. Leaders in DHS and their partners in the homeland security enterprise must practice foresight and work to understand known and uncertain risks, as best they can, in order to make sound management decisions. Addressing these risks is a shared responsibility among all resources at all levels; Federal, state, local, tribal, territorial governments, private sectors, and every day citizens. Once certain risks are under consideration, “they should be properly documented, communicated to all stake holders, and then implemented into all supporting activities (such as strategic planning, budget development, resource acquisition and allocation, education and training, and creating partnerships, to name a few)” (APUS) The practice of risk management is useful in a way that we can see what kind of approaches is more effective and implement it when we need it. Risk management applications and planning includes strategic planning, Capabilities-based planning, resource decisions, operational planning, exercise planning, real-world events, and research and development. According to the Homeland Security Risk Management Process is comprised of the following: “Define the Context, Identify Potential Risk, Assess and Analyze Risk, Develop Alternatives, Decide and Implement, and Evaluate and Monitor.” (Homeland Security, p. 15) We also need to be aware that risk not only are from external sources, but we can have risk internally as well. Examples would be personnel reliability or systems reliability. Like I stated previously, the best way we can improve risk management is from collecting data that has brought us success which is vital when it comes to implementing a secure plan. This is utilized by the risk assessment formula which is R (Risk) = T (Threat) x V (Vulnerability) x C (Consequences). Which brings us back to high probability/low consequence risks or low probability/high consequence risks. This process plays a very important role because this is where we can determine where we can focus our resources on, threat anticipation, cost of damages, fatalities, how to avoid threats, and also budgeting.

Cybersecurity plays a huge role in our everyday life. Federal agencies and our nation’s critical infrastructures- such as energy, transportation systems, communications networks, and financial services- are dependent on computerized (cyber) information systems and electronic data to process, maintain, and report essential information, and to operate and control physical processes. Critical infrastructure describes the physical and cyber systems and assets that are so vital to the United States that their incapacity or destruction would have a debilitating impact on our physical or economic security or public health or safety. “CISA (Cybersecurity and Infrastructure Security Agency) coordinates security and resilience efforts using trusted partnerships across private and public sectors, and delivers technical assistance and assessments to federal stakeholders as well as to infrastructure owners and operate nationwide.” (DHS) Not only does CISA facilitates Critical Infrastructure vulnerability assessments, but they also provide training, and fostering sector partnership and international engagements. The Department of Homeland Security has laid out their seven guiding principles for accomplishing their cyber-security goals; risk prioritization, cost-effectiveness, innovation and agility, collaboration, global approach, balanced equities and nation values. Cyber-attacks are one of the new issues that our nation faces and I believe to be the most vulnerable. Every day, our enemies try to find a way to find a way to hack our nation’s defense through the internet and create chaos to the nation and our defense. Since this threat is basically still a new thing not only to this country but to the whole World, risk management/assessment plays a huge part to taking necessary steps in helping find ways to improve cyber-security. It is important that we continue to continually assess all the different threats to our nation.

Risk Management and Cyber Security both plays a huge role and goes hand in hand in accomplishing the mission for the nation. The nation’s Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards. Achieving this will require integration with the national preparedness system across prevention, protection, mitigation, response, and recovery. “The policy of the United States to enhance the security and resilience of the nation’s critical infrastructure and to maintain a cyber-environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties” (Obama, 2013) It is almost impossible to eliminate a threat that you can’t see or know their approach to attack but with the risk management steps in place, formula, and procedures that the DHS has in place, we will be able to evaluate and take precautions to avoid certain situations.

References:

  1. Homeland Security (2010) DHS Risk Lexicon Retrieved from https://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf
  2. APUS (n .d.) Lesson 5: Risk Assessment and Management in Homeland Security Retrieved from https://apus.realizeithome.com/
  3. DHS (n.d.) Critical Infrastructure Security Retrieved from https://www.dhs.gov/topic/critical-infrastructure-security
  4. Homeland Security (2011) Risk Management Fundamentals Retrieved from https://www.dhs.gov/sites/default/files/publications/rma-risk-management-fundamentals.pdf
  5. Obama, B.(2013b). Presidential Policy Directive—Critical Infrastructure Security and Resilience. Retrieved from https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-