Design effective organization cybersecurity standards

Assignment Help Computer Network Security
Reference no: EM13787864

Develop Skills to design effective organization cybersecurity standards and policies.

Private Sector-Public Sector cybersecurity issues

Some observers say industry compliance with government regulations to improve cybersecurity is necessary to protect consumers and guard economic progress. Others state that regulation is a drag on industry, and actually reduces productivity.

Answer the following questions -- you may use the links provided below to begin your research, but you must find new, additional citations to supplement these to show that you did extra research. You may also want to refer back to discussions and assignments in the previous weeks.

Focus on the goals of private businesses, and the goals of lawmakers for economic progress and economic security

1. Focusing on the goals of private businesses, and the goals of lawmakers for economic progress and economic security, select one example private-sector industry, describe the general business goals by using information on the web sites of one or two business within this industry, and explain why meta-data about customers and consumers is important to businesses within this industry. (here, meta-data means Big-Data collected about consumers to determine customer habits).

2. Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer. Use citations to support your arguments about how some action or result related to collection of meta-data may be harmful to customers.

3. What possible activities should lawmakers consider regulating to control the way that this example industry gathers and uses meta-data?

4. What are the goals of lawmakers in the public sector -- or why should lawmakers think regulating these possible industry activities is useful?

5. What might happen to the goals of this industry, and to the public sector goals, as more new cybersecurity regulations are put in place for business compliance?

Background: Possible effects on innovation due to cybersecurity government regulations --

1. Tech Companies Warn Privacy Rules Will Kill Innovation [2012]

2. Hospitals say Device Manufacturers Resist Boosting Cybersecurity < 

3. U.S. Chamber Leads Defeat of Cybersecurity Bill [2012]

Length 5-7 pages, due at the end of Week 6.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The paper must include: cover page, table of contents, introduction, section headings and  subheadings, conclusions, APA compliant in-text citations and list of references, and page  numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the  document), then the outline should be used to create the Table of Contents and the document  sub headings. The Introduction should briefly preview each sub-heading in the document

Reference no: EM13787864

Questions Cloud

Write a description for three different products or persons : Write a description for three different products or persons. These descriptions should be a maximum of three sentences each (no minimum is required).
Rules of etiquette : 1. The rules of etiquette are
Describe the advantages and disadvantages of free trade : Describe the advantages and disadvantages of free trade. Explain if free trade can ever be fair. Justify your response.
Studying the effect of high blood sugar : Which historical perspective stated that psychologists should study the different components of the mind independently, because to understand how the conscious mind works, we must understand all of its individual parts completely?
Design effective organization cybersecurity standards : Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.
How the social structure set up in colonial latin america : discuss how the social structure set up in colonial Latin America continues to determine life for Indigenous communities today.
Case study—shortage of nurses : Case Study-Shortage of Nurses
Distinct opinion of others within the first : People usually form a distinct opinion of others within the first _______ of meeting them.
Probability of the second flip : Determine the probability that a computer purchased from this retailer has neither a read-write CD nor a DVD drive - Determine the probability that a computer purchased from this retailer does not have a DVD drive.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the order of the public key

What is the order of the public key and Which masking keys kM are possible - Decrypt the message without computing Bob's private key

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  Assume a propagation speed

Review the car-caravan analogy in Section 1.4. Again assume a propagation speed of 100km/hour

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Examine how the system balanced security and usability

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  Essence of a digital signature is ensures authentication

1. The essence of a digital signature is that it ensures authentication. Explain how and why it does that.

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  What hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  Discuss ways to reduce risk in the network

Discuss 2 ways to reduce risk in the network. Who do you think is responsible for keeping the network safe to the administrator, the users, or both? Why

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

  Deliver an it risk assessment case study

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd