response letter to homeland security

Dear Mumani Sucrets Technologies Limited, we got your request letter and are grateful for your involvement in Mumani Sucrets Technologies Limited and its overall activities. Mumani Sucrets does, in reality, own and run one of the country's biggest technology hubs. The company has grown and now has many branches in California. As a result, we understand how critical our center is to the stability of the country and the world as a whole. We also added a report to the letter in response to the appeal. The report has contents that are confidential and sensitive. Therefore, we trust and believe that the information provided in the report will be fully protected against unauthorized distribution as well as a publication under the laws of the Protected Critical Infrastructure Information. Please confirm as soon as possible on the confidentiality of the report. More so, the report has been subdivided into sections as requested in the letter.



We are looking forward to your feedback.



(Students Name)



Chief Security Manager



Mumani Sucrets Technologies Ltd.



Mumani Sucrets Technologies Limited Report



Mumani Sucrets Technologies Ltd is an information and Technology organization that offers a broad range of services to California. With more than 150 branches in California, the company is in a better position to provide different IT services to the local communities as well as the government offices. The services are inclusive of installation of fire alarms, security systems, devices that detect an intruder, power as well as data management systems and the wireless technologies. Because of the relevance of the services, that we offer a catastrophic occurrence may affect various sectors of the economy. In case of such an incident, it will influence the stability of different security, commercial, financial and communication connection networks which are depended upon when it comes to the stability of the nation (Hemme, 2015).



Mumani Secrets Ltd Essential Functions



Mumani Secrets Ltd is developed in six essential functions, which sustain the ability of the organization to generate and deliver quality IT services and products. The services are vital for maintaining the network connection in the nation. Such links include the internet, local area network, and the Wide network. The offered services are a reflection of the Government Coordinating Council (GCC) and the information and technology Sector Coordinating Council (SCC) treaty on the critical functions that are retrieved from the Information and Technology Sector Baseline Risk Assessment (ITSRA) (DHS, 2016). The company provides the significant features in collaboration with other IT firms and their associates as well as operators who manufacture or supply Software, hardware, and other relevant services. The support services that IT provides comprises of the expansion, integration, operation, communication, testing, and security (DHS, 2016). Therefore as a significant division of the nation’s critical structure should any disaster befall the system it will have a major effect on the customers who depend on the services for their short as well as long-term necessities (DHS, 2016).



Partnership with Government and IT Industry



The company is one of the shareholders in information and technology sector offers as well as produces quality IT products and services. We understand that the partnership between the government and the IT industry is vital to establish a sustainable risk eradication scheme in a sector, which is as big and diverse as the IT section (DHS, 2016). IT organizations are significant while dealing with issues concerning cyber security. Most IT firms inclusive of Mumani Sucrets Technologies Ltd collaborate with relevant agencies from the government, and together they address the problems by sharing the data as well as information with the Department of Homeland Security (Givens & Busch, 2013).



The main aim of the strategy was collecting crucial information from trusted agencies with an objective of assessing as well as eradicating any impact in case of a catastrophic occurrence (Hemme, 2015). The information shared amongst the national, state and central intelligence divisions on the relevant steps to be observed in case of cyber terrorism (Hemme, 2015). Close to 85 percent of the United States, primary structures belong to the private organizations, which make the collaboration critical for Homeland security (Hemme, 2015). Recognition of any organization depends on the ability of the firm to provide services that are free from risk to their customers thus Mumani Sucrets Ltd has always been upgrading as well as expanding the security protocols so that they can counter the upcoming generation of spams and malware (Givens & Busch, 2013).



Security Measures and Response Drills



The database of the company is encrypted fully and are stored in a secure location that are fitted with integrated biometric access. In addition, the firm developed a hazards threat evaluating procedure, which reflects the ability of the company to maintain the operations while sustaining the national security as a section of the risk evaluation protocol at the national level. The top-down tactic is used to put role into categories that confer with the least risk threshold (DHS, 2016). Therefore, the firm's resources are utilized in the analysis and eradication of substantial threat to the crucial infrastructure together with their auxiliary functions. The company has several response drills centers across California, which are conducted with the aim of countering cyber intrusion threats as well as natural disasters (DHS, 2016). The exercises have revealed that in case of a cyber attack the mainframe installation system has the capability of allowing the organization to regain control of the significant operations in all branch. The response that has been implemented from the drills has allowed Mumani Sucrets Ltd be able to avoid any physical or cyber threats (Carvalho & Rabechini Junior, 2015).



Some of the events are unpredictable or rather are not easily predicted, and the company is aware. Because of this fact, the relevant countermeasures can not be put in place (Hemme, 2015). However, the firm is using any possible security steps that can be implemented to ensure that there is the continuous provision of services to their clients. Mumani Sucrets Technologies Ltd has put its maximum dedication to welcome a new security boost as well as superior customer services. We are prepared to be an outstanding company in the entire IT section through sharing information continuously with the relevant shareholders in the IT industry (Givens & Busch, 2013). The partnership is consistent since it increases the efficiency of communication within the state and in the entire nation. It enables the state as well as the federal security agencies to update the firm on a routine basis in case of identified security threats (DHS, 2016). More so, the agencies always equip the collaborators with relevant information that concerns current together with the future risks that are a threat to the nation’s crucial infrastructure. Furthermore, Mumani Sucrets Ltd has vowed to utilize continuous risk evaluation in conjunction with the allocation of resources to generate rigidity against the risks that are emerging which can be adopted by cyber hackers and terrorists. The main aim of the evaluation is to prevent interference of services together with the related losses to the customers (Givens & Busch, 2013).



Conclusion



To conclude the organization has put its dedication towards a safer partnership with all government agencies. The company is willing to share any relevant information to sustain an open communication network with all partners who can provide crucial information on the emerging threats. Finally, Mumani Sucrets Technologies Ltd is aware of the contribution the DHS offers towards the protection of related IT essential infrastructure in the US and particularly in California.



Reference



Busch, N. E. & Givens, A. D., (2013). Information Sharing and Public-Private Partnerships: The Impact on Homeland Security. Homeland Security Rev., 7, 123.



Carvalho, M. M. D., & Rabechini Junior, R. (2015). Impact of risk management on project performance: the importance of soft skills. International Journal of Production Research, 53(2), 321-340.



Hemme, K. (2015). Critical infrastructure protection: Maintenance is national security. Journal of Strategic Security, 8(5), n/a. doi:http://dx.doi.org.ezproxy2.apus.edu/10.5038/1944-0472.8.3S.1471



United States Department of Homeland Security, (2016). Information Technology Sector-Specific Plan: An Annex to the NIPP 2013. Retrieved August 14, 2017, from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-information-technology-2016-508.pdf

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price