Dealing with the aftermath of new cybersecurity policy

Assignment Help Operating System
Reference no: EM132333082

Policy Soup: Dealing with the Aftermath of a New Cybersecurity Policy

Prepare a 5 to 7 paragraph "Expert Opinion" for local government officials. This document should briefly present a strategy for communicating with residents about a new "cybersecurity" policy that places access restrictions upon the local government's online services website.

Background: Due to increased hacking attempts against the Service Request system, the local government adopted the new policy without allowing time for public comment. There has been a significant amount of backlash including a protest by sports coaches and youth group leaders who were unable to file reservation requests for ball fields and meeting rooms in local Parks & Recreation facilities.

The newly adopted "cybersecurity" policy requires two-factor authentication (logon/password, PIN) in order to gain access to online services. The registration form requires name, address, cell phone number, email address, date of birth, and the last four digits of the individual's social security number. The PIN is sent to the cell phone number (text message) or email address each time an individual attempts to logon to the

Service Request system. If the PIN is not entered correctly, the logon will fail and access to services will be denied.

Your "Expert Opinion" (document) should address the following issues:

How can the local government officials convince residents that this "invasion of privacy" (collection of personal information during account registration) is necessary and for their benefits?

Should the local government suspend implementation of the new policy for 90 days (180 days?) to allow members of the public to comment on the new policy? Why or Why not?

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Reference no: EM132333082

Questions Cloud

Obtaining PhD in Information Technology : Where do you see the future of Information Technology going and where do you see yourself in this mix after obtaining PhD in Information Technology
Information technology should be partnership with business : Discuss the way business should have a strategic partnership with IT. about the way Information Technology should be a partnership with business,
Define how does music impact mood : Based on the question, "How does music impact mood?": Explain how you could quantitatively investigate how music impacts mood.
What are the main advantages and limitations of each : The chapter in your textbook introduces various graphs, charts, & plots. What the main advantages and limitations of each of these in terms of data exploration
Dealing with the aftermath of new cybersecurity policy : Policy Soup-Dealing with Aftermath of New Cybersecurity Policy.-briefly present a strategy for communicating with residents about a new "cybersecurity" policy
Summarizing the path a bill takes to become a law : Write a 525-word paper summarizing the path a bill takes to become a law. Health policy issue is "Limited Practice Authority for the Nurse Practitioner"
Define what are the essential concepts of recruitment : Based on your review, please respond to the following: Specifically focus on the 3 essential concepts of recruitment and select any one of the concepts.
Explain the different types of insurance programs : This week you are required to conduct research into the different types of insurance programs that might be available in an organizations compensation.
Define stage of the performance management process : From the e-Activity, evaluate the effectiveness of the selected organization's performance management process. Next, decide the extent to which each stage.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd