Custom Writing Service: Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate an attack similar to the SCADA / Stuxnet Worm.
1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.
3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure.
4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate an attack similar to the SCADA / Stuxnet Worm.