How to set up or improve their cybersecurity

Assignment Help Computer Network Security
Reference no: EM13283346

How should government justify telling private industry how to set up or improve their cybersecurity?
• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector cybersecurity.
• Clearly discuss the methods of government intervention. That is, what authorities (such as laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry?

  • Describe real-world examples that help support your discussion.

2. Clearly discuss the impacts/effects, if any, on national security due to government regulation required to be implemented by private industry.
• Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements.
• Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

  • Describe real-world examples that help support your discussion.

Hint: First prepare an outline based on the questions asked in this assignment. The outline is not submitted as part of the final report, but it should be used to help structure your TOC. Also, the introduction should provide a brief preview for the reader, indicating what areas your research explored. Do this for all your research papers, both the individual and the team projects.

5-7 pages. APA formate, due on Sept 14, Thanks

 

Reference no: EM13283346

Questions Cloud

Research the simple computer games snake and tron : Research the simple computer games "Snake" and "Tron."
The command sequence in a normal smtp session : 1.What would the command sequence in a normal SMTP session be? Use C: to preface a command issued by the client and S: to preface a command issued by the server.
Advertising during the super bowl is pricey : Advertising during the Super Bowl is pricey and reserved for mega brands, but local television stations are allowed to air local advertisements during the broadcast.
Refuse to produce an energy-gobbling appliance : Should a marketing manager or a business refuse to produce an energy-gobbling appliance that some consumers are demanding? Should a firm install an expensive safety device that will increase cost but that customers do not want? Are the same principle..
How to set up or improve their cybersecurity : How should government justify telling private industry how to set up or improve their cybersecurity?
Object-oriented design to design a parent class called book : Use object-oriented design to design a parent class called Book that will receive the ISBN, author, title and price of a book, and select and print records for all books with a price of more than $50.00. Design a child class called TextBook th..
Immanuel kant would support the golden rule of religion : Immanuel kant would support the golden rule of religion. ethical relativism has been widely adopted as an ethical theory because of its universal moral norms and strict guidelines
Risk averse-risk seeking or risk neutral : Interview a businessperson who makes decisions, some of which are likely to involve some degree of risk. Assess their utility curve for money similar to the one that was constructed in the Measuring Risk (page three) lecture from earlier this week.
Social responsibility is the branch of philosophy : A socially responsible business person believes that the formal legal law is inferior to universal moral and ethical principles that can be determined by intuition. Social responsibility is the branch of philosophy that focuses on morally right and w..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  The relation between passwords and key size

the relation between passwords and key size. For this purpose we consider a cryptosystem where the user enters a key in the form of a password

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd