How improve global cooperation to respond to cybersecurity

Assignment Help Management Information Sys
Reference no: EM131231099

Case Study : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies.

Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Businesshttp://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/.

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131231099

What is the role of the information and news media

Does the information media have social responsibility? If yes, in what ways? If not, why not? What is the role of the information and news media in the shaping of political op

What assumptions did professor mcpherson make

Source: Corporate Information Systems Management: Text and Cases (6th ed.) by Applegate, McFarlan, and Austin, What assumptions did Professor McPherson make about information

What are the three major lines of business within insuracorp

What are the three major lines of business within InsuraCorp - What IT organization structure was used at InsuraCorp prior to the adoption of the centralized approach? What w

What tools would you use to assist in your planning efforts

Discuss some of the key considerations in designing a network design strategy. What approaches have worked for you in your present role or would you propose in a future syst

Drawbacks of instituting a quality policy

What are some options for ensuring that testing will always be utilized to its fullest abilities. Any well-defined and planned project will have a quality plan in place before

What is the schedule variance at the end of period 5

What is the schedule variance at the end of period 5?-  What is the cost variance at the end of period 5? - Given the current information, will the project finish on schedule

Create a potential liability as employee can be stolen

Databases create a mass of information that is easily searched and accessed. They also create a potential liability as employee and customer information can be stolen and mi

Monitoring employee in workplace by using digital technology

Monitoring employees in workplace by using digital monitoring technologies. My part is Advantages and Disadvantages of using technologyto monitoring employees at the workplace

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd