Discuss the vulnerabilities in the cyber security

Assignment Help Computer Network Security
Reference no: EM13963299

Evaluation of the Global Impact of the Georgia/Estonia Cyber Event

Objective:

Assess and evaluate the global impact of the Georgia/Estonia Cyber Event based upon the application of ethical policies, security practices, theories, and principles. In the report, apply cybersecurity policy, laws, regulations and global concepts to your analysis.

Competencies:

Security Practices, Information literacy/Research skills

Problem solving, Global impact of a Cyber Event

Policy Experience

Individual Assignment

Each student will evaluate the global impact of the coordinated cyber attack directed against either (A) Georgia, OR (B) Estonia. Each student will write a 10-15 page policy brief about the country that was attacked, detailing the best policy and security practices to mitigate the effects from possible future coordinated cyber attacks. If you have any questions, please ask them early in the week so you have enough time to complete this assignment on time.

Students are to

1. Choose a single country (Georgia or Estonia) and discuss only that one country.

2. Students must use sub-headings in their report , including for the Introduction and Reference List.

3. Each report must include discussion of the following topics under Sub-headings

A. Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack event reported in the media for only one country - either Georgia or Estonia (hereinafter called the "Georgia/Estonia" cyber event).

B. Discuss the alternatives, including possible advantages and disadvantages for reducing each named vulnerability and for improving each named security practice or policy, in order to mitigate future cyber events.

C. How should these changes be rolled out or implemented by the national government?

4. Do not include discussion about powers of a theoretical "Cyber Czar".

5. The report should be 10-15 pages. (The reference list is outside of the page limit.)

Support your position with policy, security practice, theories, principles and recommendations based on your own thoughts, examples and cited references.

The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report.

Verified Expert

Reference no: EM13963299

Questions Cloud

How would you overcome the defenses to the alleged breach : Determine the information that you would need to know to best determine if there was a contract. How would you present a case to a court to show your client was the victim of a breach of contract, and how would you overcome the defenses to the all..
What is the resistance of the heating coil : If a lamp has a resistance of 120 ohm when it operates at a power of 1.00 x 10^2 W, what is the potential difference across the lamp?
Paper - terrorist organization : For this paper, pay close attention to the following guidelines. Keep in mind, college-level research and writing is a process that takes time, and you will likely need to write multiple drafts of your work to create a quality paper. Select one te..
Main forms of legal business ownership : Compare and contrast (pros and cons) of the 3 main forms of legal business ownership. (Sole proprietorships, partnerships, and corporations) So, describe each one, and tell us a little about the pros/cons or advantages/disadvantages of each.
Discuss the vulnerabilities in the cyber security : Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack ..
How long is the football in the air : A motorcycle has a velocity of 15 m/s, due south as it passes a car with a velocity of 24 m/s, due north. What is the magnitude and direction of the velocity of the motorcycle as seen by the driver of the car?
Detriment of the public interest : Concern that the manufacturers of harmful products such as tobbacco have influence on law makers to the detriment of the public interest is used as evidence of which criticism of marketing?
Calculate the resistance of a piece of 20-gauge copper wire : A 150-W street lamp is operated for 12 hours a day. How much energy does it take to operate the lamp for 30 days? Express your answer in kilowatt-hours and in joules.
Different levels of quality for a company : The use of price points for reference to different levels of quality for a company's related products is typical of which product mix pricing strategy?

Reviews

Write a Review

Computer Network Security Questions & Answers

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Network security

Network Security

  Network topology diagram and the domains of trust

Network topology diagram and the domains of trust Security-related assumptions in your design and security policy to make this assumption valid and give a classification about users according to their trust domain

  Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

  Describe the process used in restoring the scrambled bits

Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.

  Extract the password hashes from a machine

Extract the password hashes from a machine

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Classify the following vulnerabilities using the risos model

Classify the following vulnerabilities using the RISOS model. Assume that the classification is for the implementation level. Justify your answer.

  Strategies for developing secure software

You want to convince your software development manager that the team needs to include strategies for developing secure software. Your first step is to help your manager understand the common sources of risks in software. 1. Write a ½ to 1 page memo t..

  How many fiu webpages contain admin in the url

Search to find how many FIU webpages contain admin in the URL (hint: must combine multiple directives) Record how many hits found and explain why this would be valuable in conducting reconnaissance, what do we learn or find out? Try

  Critically evaluate the system abc company uses

Critically evaluate the system ABC Company uses. Identify possible security risks and evaluate the relative threat posed by those risks. Identify and explain methods, if any, to address those risks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd