Why cooperation on a global basis is required cyber security

Assignment Help Computer Network Security
Reference no: EM131024988

Case Study: How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare athree-page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Businesshttps://www.iccwbo.org/Data/Documents/Digital-Economy/Cyber-Security-Guide-for-Business/ICC-Cyber-security-guide-for-business/

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write athree-page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131024988

Questions Cloud

Formulate a liner programming model for this problem : .What is the effect on the optimal solution if the profit per yard of denim is increased for 2.25 to 3.00? What is the effect if the profit per yard of corduroy is increased from 3.10 to 4.00?
What should frank kelsey recommended to jean fontaine : What should Frank kelsey recommended to jean Fontaine at the end of the case? why?
Find two systems of homogeneous linear equations : Find dim V and dim W and calculate the dimension of V+W using the dimension formula
How many grams of ethyl acetate are formed : The equilibrium constant for this reaction at 55 °C is 6.68. A pharmaceutical chemist makes up 15.0 L of a solution that is initially 0.275 M in acetic acid and 3.85 M in ethanol. At equilibrium, how many grams of ethyl acetate are formed?
Why cooperation on a global basis is required cyber security : An introduction which addresses the reasons why cooperation on a global basis is required to address cyber security challenges. This introduction should focus on political, economic, and social factors.
Asset management strategic planning : You are an asset manager for a medium sized company, the primary purpose of which is to provide services or products to industrial and/or domestic consumers. Some examples of such an organisation include, but are not limited to:
Provide the missing data in the following table : Provide the missing data in the following table:
What are their coordinates on a graph : How are addition and multiplication used to solve a linear equation?
Calculate the pressures in torr of all reactants : Methane, CH4, reacts with I2 according to the reaction CH4(g) + l2(g) ? CH3l(g) + HI(g). At 630 K, Kp for this reaction is 2.26 X 10-4. A reaction was set up at 630 K with initial partial pressures of methane of 105.1 torr and of 7.96 torr for I2...

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Data standards and data security

Data Standards and Data Security

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Investigate and report on the current state of organisation

Investigate and report on the current state of organisation - Write a research paper and organise it in the way - adopt to improve security.

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Biometric authentication methods for on-line transactions

What is the weakness for Biometric authentication methods for online transactions

  What are critical points in determining intention of sandra

Explain what MBT and Sandra could have done to protect against controversy arising - what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra?..

  Provide network layout showing all components of rps network

Provide a network layout (network diagram) showing all the components of RPS network including both firewalls, the email and web servers, the DMZ, and all the internal hosts

  Discuss your rationale for choosing the specific firewall

From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  Explain information security threats and vulnerabilities

Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd