CIS 502 MENTOR Extraordinary Life/cis502mentor.com CIS 502 MENTOR Extraordinary Life/cis502mentor.com | Page 30

Suggest three ( 3 ) methods to improve the protection of the U . S .’ s critical infrastructure , and justify each suggested method .
Evaluate the effectiveness of IS professionals in regard to protecting the U . S .’ s critical infrastructure , and indicate the strategic ways that you believe IS professionals could better serve as protectors .
Use at least three ( 3 ) quality resources outside of the suggested resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
Your assignment must follow these formatting requirements :
Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .
The specific course learning outcomes associated with this assignment are :
Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities .

Suggest three ( 3 ) methods to improve the protection of the U . S .’ s critical infrastructure , and justify each suggested method .

Evaluate the effectiveness of IS professionals in regard to protecting the U . S .’ s critical infrastructure , and indicate the strategic ways that you believe IS professionals could better serve as protectors .

Use at least three ( 3 ) quality resources outside of the suggested resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .

Your assignment must follow these formatting requirements :

Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .

Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .

The specific course learning outcomes associated with this assignment are :

Analyze the methods of managing , controlling , and mitigating security risks and vulnerabilities .