Provide evidence that cybersecurity is a distinct industry

Assignment Help Case Study
Reference no: EM131218079

Case Study: Is there a cybersecurity industry?

Case Scenario:

You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price.As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS)code(s)for the "cybersecurity" industry to the company's Website.As you delve into the matter, you quickly discover that there is no NAICS code for a "cybersecurity" industry(see https://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012).After additional research, you learned that the NAICS codes for your company's direct competitors (companies selling similarcybersecurity products) included the following:

• Computer and Electronic Product Manufacturing (NAICS prefix "334")

o Computer Terminal and Other Computer Peripheral Equipment Manufacturing
o Computer Storage Device Manufacturing

• Information Industry (NAICS prefix "51")

o Custom Computer Programming Services
o Software Publishers

• Professional, Scientific, and Technical Services Industry (NAICS prefix "54")

o Computer Systems Design Services
o Electronic Stores

• Retail Trade (NAICS prefix "44")

o Electronic Stores

You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industriesto the NAICS classification system (see NAICS Update Process Fact Sheet, p. 4, section "The Four Principles of NAICS" https://www.census.gov/eos/www/naics/reference_files_tools/NAICS_Update_Process_Fact_Sheet.pdf)

Your team leader has asked you to write a short report detailing your findings andrecommending which industry your company should declare as its primary industry (out of the four listed above). Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why "cybersecurity" isconsidered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.

NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports. Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier.

Research:

1. Read / Review the Week 5 readings. Pay close attention to those readings which provide evidence that "cybersecurity" is, in fact, an industry.

2. Research additional information about industry classifications, why they were developed, and how they are used. Here are some suggested sources:

a. https://www.naics.com/history-naics-code/

b. https://www.naics.com/naicswp2014/wp-content/uploads/2014/10/How_to_Use_NAICS_SIC_Codes_for_Marketing_NAICSAssociation.pdf?

c. https://www.bls.gov/bls/naics.htm

d. https://www.census.gov/eos/www/naics/reference_files_tools/NAICS_Update_Process_Fact_Sheet.pdf (See page 4: "The Four Principles of NAICS" Principles #1 & #2)

3. Find three or more additional sources which provide evidence that "cybersecurity" is or is not a distinct industry.

Write:

Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your summary must include the following:

1. Introduction which includes a well-reasoned explanation as to why "cybersecurity" is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why).

2. Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should include a comparison between your company's business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54).

3. Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports.

Reference no: EM131218079

Questions Cloud

Networked application of your choosing : Write a one-page summary of a networked application of your choosing. Conciseness is more important than comprehensiveness, although you should strive for a balance between both. The definition of a networked application in this instance is relati..
Provide a rationale for each recommendation : As the primary Technical Writer, you have been asked to consider building a blog within the client's new website. Your boss has asked you to write about corporate blogging, make recommendations, and provide a rationale for each recommendation. You..
Research of the country business ethics and values : Based on your research of the country's business ethics and values, how will you manage any conflicts that arise during negotiations? Describe how you will ensure no harm is caused to the business relationship. Ensure the conflict management strat..
National institute of standards and technology : How can the National Institute of Standards and Technology (NIST), help your company create a "best practices" cybersecurity policy? Your discussion should touch upon both the positive and the negative aspects of a well-structured policy. Be sure ..
Provide evidence that cybersecurity is a distinct industry : Find three or more additional sources which provide evidence that "cybersecurity" is or is not a distinct industry. Read the readings. Pay close attention to those readings which provide evidence that "cybersecurity" is in fact, an industry.
Automate maintenance tasks : You would like to automate maintenance tasks when specific events appear in the workstations event logs. Before you create a schedule response to the events, you need to know how often the events occur on each computer. What can you do with window..
What appear to be the goals of this hate group : Locate a hate group on the World Wide Web. Include the name of the group and the URL.
Write a paragraph describing at least two reasons : The IPv6 Network Addressing Standard was published back in 1998. Write a paragraph describing at least two reasons why the conversion to IPv6 has not been completed.
Cases for a university library borrowing system : Create a set of use cases for a university library borrowing system. (Do not worry about catalogue searching, etc.) The system will record the books owned by the library and will record who has borrowed what books.

Reviews

Write a Review

Case Study Questions & Answers

  Research on two recent australian cases

Research on two recent Australian cases (not more than 10 years old) involving consumer protection laws. Write a report outlining the following: Case introduction, Outline the Trade Practices Act / Australian Competition and Consumer Act have been br..

  Which forces if altered would produce rapid change

How significant are each of them? What is their strength? Which ones can be altered? Which cannot? Which forces can be altered quickly? Which ones only slowly? Which forces, if altered, would produce rapid change?

  How effective you think they are for tylers success

What are some of the supports that have been put into place for Tyler's success in kindergarten? List at least 3 different supports and how effective you think they are for Tyler's success

  Conduct a case-control study on phthalate exposure

Conduct a case-control study on phthalate exposure and sperm abnormalities in adult men - identified and enrolled from among patients at their infertility clinic.

  What are some of the key concerns for her staff

What are some ways she can work her own training into her schedule? What are some of the key concerns for her staff, and how might they be addressed

  You are a manager in a multi-national manufacturing company

Case study scenario: You are a manager in a multi-national manufacturing company who has been sent to set up a large subsidiary in South Africa. Prepare a management report for the Chief Executive Officer (CEO) of the company giving your recommendati..

  Write brief two-paragraph narrative that categorizes type

Write a brief two-paragraph narrative that categorizes the user type, identifies the category of PC (s) required, and summarizes your recommendations - Identify a specific operating system and version

  Formally separate operations dbas from other dbas

Create a formal service-level agreement (SLA) between IS and end users for each database application. Formally separate operations DBAs from other DBAs, giving them different titles and possibly different managers.

  Write a letter informing minnie that you closing down site

Write a letter informing Minnie that you are closing down her site if she does not pay the money she owes you. Should you fully explain that she has been a difficult customer, or should you rely on her lack of payment as your reason for breaking t..

  Describe the type of response expected from the chain

Speculate any international procedures violated by Tom and George. Describe the type of response expected from the chain of events and type of attack from the two employees.

  Project business case based on an it project case study

Project business case based on an IT project case study - A business case is the first deliverable in the IT project life cycle

  Should data be accessible in a criminal case

Do you agree with that verdict? Should data be accessible in a criminal case even if it is stored in another country?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd