What effect would implementing the proposal have

Assignment Help Management Information Sys
Reference no: EM131312580

IT 238 Essay Questions

This part of the exam consists of four essay questions worth 10-20 points each. These questions require longer answers than the short answer questions, and there's no single correct answer for the questions. For that reason, your explanation is more important than a specific answer.

Spell check and proofread your answers carefully. One free typo per question, after that each typo will result in a deduction of one point, up to five points per question. There are additional specific grading policies described with each question.

Everything you need to answer these questions can be found in the textbook or other reading and videos assigned during the course. You may search the internet for relevant information, but be aware as always that the internet is an unreliable source of information and terminology varies, so this is a risky approach.

All work on the exam must be your own. You are not allowed to use any quotations from any source in your answers. Any students found to be working together or sharing answers will each receive a zero on the entire final exam. Plagiarism from any source will also result in a zero.

You must upload your answers to all questions in a single PDF document.

Question 1. The United States has taken the position that the acceptability of cyber espionage depends upon the motivation of the espionage and what is done with the stolen information. This is most obvious in the United States position towards China's espionage activities.

What does the United States believe is an appropriate motivation for espionage, and what is inappropriate? Your answer must include an example of a cyberattack we read about this quarter that had appropriate motivation and one with inappropriate motivation.

Grading for question 1. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points. The answer to this question requires that you describe two attacks. If you fail to do so, you will lose 2 points for each one.

Question 2. You are in charge of IT for an electric utility. The CEO of the company suggests disconnecting the company's computer network from the internet so that you don't have to worry about all of that "cybersecurity stuff".

Respond to the CEO by saying why the suggestion of creating an "air gap" is not sufficient to protect your network against cyberattacks. In your response, describe one cyberattack that we learned about this quarter where the target was not connected to the internet.

Grading for question 2. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points. 5 points will be deducted if you do not describe a cyberattack as required in the instructions.

Question 3. Explain whether you believe the following statement to be true, and why or why not?
Countries are unlikely to attack the United States in cyberspace because they fear that the United States will retaliate with cyberattacks against them.

You must justify your answer by referring to topics covered in the class, you can't just base your answers on general beliefs like "other countries fear (or do not fear) the US".

Grading for question 3. This question is worth 10 points. Your answer must be at least 100 words in length. If it is between 50 and 99 words, you will receive a maximum of 5 points. If it is less than 50 words, you will receive 0 points.

Question 4. You have been hired by President-elect Trump as a cybersecurity advisor. Write an essay proposing what you believe is the most important action/policy/law he should pursue to improve cybersecurity in the United States.

Your essay must include the following:

• A description of the proposal.

• What effect would implementing the proposal have - how would it improve cybersecurity?

• Which of the three elements of deterrence is the proposal most closely related to?

• Identify at least one cyberattack we have read about this quarter where the proposal would make the attack less likely to occur, and explain why.

Please do not inject political commentary in your answer, what you write should be the same regardless of who actually won the election.

Grading for question 4. This question is worth 20 points. Your answer to Question 4 should be 250-400 words in length. If your answer is between 200 and 250 words, the maximum score is 15 points. If your answer is between 150 and 250 words, the maximum score is 10 points. If your answer is less than 150 words in length, no credit will be given.

Each of the bullet points above are given equal weight in the grading of this question

Reference no: EM131312580

Questions Cloud

What is meant by the term stagflation : What is meant by the term 'stagflation'? What happens if stagflation occurs within the economy in terms of consumer spending and consumer confidence?
Compute the average number of collisions : Design and implement a program that compares the use of linear probing, quadratic probing, and double hashing on a collection of string keys of varying lengths
Considering investing in a bond with a face value : Kayla is considering investing in a bond with a face value of $12,000 with a coupon rate of 12% payable on a monthly basis. If she can get a 2.5% return per quarter on her money, what are the quarterly payments that she can receive from the bond?
Anticipation of an upcoming international price negotiation : Describe the kinds of problems that usually come up during international business negotiations. What kind of research can you do in anticipation of an upcoming international price negotiation?
What effect would implementing the proposal have : What effect would implementing the proposal have - how would it improve cybersecurity?Which of the three elements of deterrence is the proposal most closely related to?Identify at least one cyberattack we have read about this quarter where the propo..
Implement the remove operation for the hashmap adt : Design and implement an iterator for use with the implementation of the HashMap ADT
What price should giuseppe set : The Firegut has been selling at the brisk pace of 500 burritos per week.  To increase market share, Giuseppe would like to increase sales to 750 per week.  What price should Giuseppe set?
Does the estimated maximum preload threaten your bolts : Does the estimated maximum preload threaten your bolts?- What range of bolt tension (preload) and clamping force do you now anticipate for your joint in production?
Identify the pros and cons of prevention program you located : Why do you think so much attention is focused on keeping children home, despite the allegations of child abuse and/or neglect? Identify the pros and cons of prevention programs you located.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd