Discuss whether private industry now has a responsibility

Assignment Help Computer Network Security
Reference no: EM131391119

Assignment

Course Objective: Research cybersecurity laws, regulations and legal concepts, and relate them to managerial decisions needed to protect national security.

Each student explores cybersecurity as a public good.

Answer these questions:

1. How should government justify telling private industry how to set up or improve their cybersecurity?

• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector cybersecurity.

• Clearly discuss the methods of government intervention. That is, what authorities (such as laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry?

• Describe real-world examples that help support your discussion.

2. Clearly discuss the impacts/effects, if any, on national security due to government regulation required to be implemented by private industry.

• Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements.

• Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

• Describe real-world examples that help support your discussion.

Hint: First prepare an outline based on the questions asked in this assignment. The outline is not submitted as part of the final report, but it should be used to help structure your TOC. Also, the introduction should provide a brief preview for the reader, indicating what areas your research explored. Do this for all your research papers, both the individual and the team projects.

Length 5-7 pages, due at the end of Week 2.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The paper must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.

Reference no: EM131391119

Questions Cloud

Review proposals on how to move forward on security issues : Review proposals on how best to move forward on security issues. As a network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in this building to support university operations.
Discuss different types of bariatric : Discuss different types of bariatric (weight-loss) surgery, applications for each and considerations before electing for surgical weight-loss intervention.
Analyze the steps involved in preparing a cash budget : Analyze the steps involved in preparing a cash budget and determine which step(s) presents the greatest number of obstacles to the greatest number of small businesses. Explain your rationale.
Compare and contrast mitosis and meiosis : Question 1. Compare and contrast mitosis and meiosis (include at least 3 comparisons and 3 differences).
Discuss whether private industry now has a responsibility : Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.
Explain the relevant law relating to the case : BBAL401 Company law Group Assignment and Presentation. Written Assignment: Identify the facts of the case. Explain the relevant law relating to the case. Discuss the legal arguments raised by the parties in case
What is its grid location and part number : Its low-order address is multiplexed like the 68HC11 in Problem 17-30. What IC and control signal are used to demultiplex the address/data bus (AD0-AD7) into the low-order address bus (A0-A7)?
Create class account with id balance person and datecreated : Create class Account with id, balance, Person, and dateCreated. Use a static class variable to store the annualInterestRate for all account holders. Provide constructors, setter and getter for the Account class.
Directly causes what form of heart disease : If the muscle tissues of the heart are deprived of oxygen too long, the cells begin to die. This directly causes what form of heart disease?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  Describe the three principles of ip security

Describe 'The Three Principles of IP Security'. Cite references as well as a detailed explanation for the same. Explain how you would as an employee of a company practice those principles

  Disaster-recovery processes and business-continuity planning

Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning.

  Analyze proper physical access control safeguards

Analyze proper physical access control safeguards and provide sound recommendations to be employed in the registrar's office.

  Questions on security in computing and program security

Frequently asked questions on security in computing, program security , operating system , database security ? what is intrusion detection system , what is firewall , what re the non malicious programming errors , theft to security , how to contro..

  Concentrate on the digital signatures and certificate chain

You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..

  What are the advantages of using dynamic dynamic ip address

COM309: What are the advantages and disadvantages of using dynamic IP address assignments? Find the least-cost route from Node A to all other nodes.

  What kind of environment is being faced by cybersecurity

Why will the policy decisions faced by a telecommunication executive be very different from the policy decisions faced by a military strategist? What kind of environment is being faced by cybersecurity decision makers

  Which will encrypt each users data in a file

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Problem regarding the cyber-attack

This exercise is to identify and characterize assets. Imagine there is a severe natural calamity in your area and your personal vehicles have been rendered immobile. The local mayor is running school buses on their routes to evacuate residents and..

  What other ways can you track and measure the performance

what other ways can you track amp measure performance of a project other than earned value measurement evm? are some

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd