Explain the complexities of internet governance

Assignment Help Computer Network Security
Reference no: EM133954664 , Length: 7 pages

Assignment:

Write a 4 to 5 page Overview and Technology Roadmap using Microsoft® Word responding to the following:

Scenario: You are assisting the Chief Information Security Officer (CISO) for a start-up company that just acquired multiple cloud service providers in the U.S. the EU and may possibly acquire more in Germany and Saudi Arabia. The company plans to transform its business offering by consolidating the acquired technology platforms into a single mobile app. This transformation will require a complete revamp of the company's internal and customer-facing terms of service and privacy policies.

You are asked by the Board of Directors to provide an overview on how to address the complexities of data security and privacy during and after this business transformation. You will need to explain the complexities of internet governance, cloud technology, and user privacy so the Board can make well-informed decisions on how to proceed. In addition, the Board asks you to create a technology road map that defines key solutions that can be implemented over time to establish a robust customer data privacy and security program. Be sure to address the unique challenges posed by public policies related to internet governance and personal information protections.

Your task is to:

  • Provide a detailed overview of internet governance, cloud technology, and user privacy. The overview should include:
  • A complete description of the complexities of public policies that may impact cloud technology and users in this business transformation including an explanation of the impact of the net neutrality debate and data protection laws
  • Three advantages cloud technology can offer users and businesses based in the U.S. and EU
  • Provide a technology roadmap of five key solutions that will help establish data privacy and security for citizens and companies in the U.S. and EU, addressing the unique challenges posed by public policies related to internet governance and personal information protections.
  • Based on your lab experiences in this course,include in your roadmap a concise explanation of how Microsoft® Azure® or Microsoft® System Center 2012 could be leveraged to assure privacy and confidentiality of data.
  • Examine where we are today in regards to internet governance and offer a prediction of the future given your current perspective, including how the differences in internet governance from country to country may impact the future.

Develop a 1 to 2 page table comparing business traditions of companies in the U.S, Germany, and Saudi Arabia in the following areas: business etiquette, manners, and culture. The table will be used by the board as they consider moving into Germany and Saudi Arabia. The counties should be the column headers and the attributes should be the row headings.

All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

Reference no: EM133954664

Questions Cloud

Provide universal design images or technology : Provide three Universal Design images or technology that increase inclusivity for people with disability (i.e., sensory, physical, psychological, mental
What specific clinical signs and symptoms would you assess : What specific clinical signs and symptoms would you assess to confirm or correlate with abnormal fluid and electrolyte laboratory results?
Were the victims rights upheld : How could the response have been improved to provide better support to the victim and Were the victim's rights upheld
How often participants walked near their home : In Wang et al. (2022), physical activity was subset into two categories, sufficiently active. How often participants walked near their home.
Explain the complexities of internet governance : The Board of Directors to provide an overview on how to address the complexities of data security and privacy during and after this business transformation.
What are some of the barriers victims of intimate : What are some of the barriers victims of intimate partner violence face when trying to leave abusive relationships, as discussed in Chapter 8
Explain why it is a mental health global related issue : Provide an explanation about what depression is and explain why it is a mental health global related issue that needs to be addressed from a policy standpoint.
Give a biography as a healthcare professional : Give a Biography as a healthcare professional, currently lecturing on Public Health at Sierra College of business Technology and Health care studies.
Which are included in that list of strategies : The CDC recommends several strategies for designing communities that support safe and easy places for people. Which are included in that list of strategies?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd