Provide advanced threat detection at an affordable price

Assignment Help Computer Network Security
Reference no: EM131653507

Case Study Assignment: Is there a cybersecurity industry?

Case Scenario:

You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price. As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS) code(s)for the "cybersecurity" industry to the company's Website.As you delve into the matter, you quickly discover that there is no NAICS code for a "cybersecurity" industry. After additional research, you learned that the NAICS codes for your company's direct competitors (companies selling similarcybersecurity products) included the following:

• Computer and Electronic Product Manufacturing (NAICS prefix "334")

o Computer Terminal and Other Computer Peripheral Equipment Manufacturing
o Computer Storage Device Manufacturing

• Information Industry (NAICS prefix "51")

o Custom Computer Programming Services
o Software Publishers

• Professional, Scientific, and Technical Services Industry (NAICS prefix "54")

o Computer Systems Design Services
o Electronic Stores

• Retail Trade (NAICS prefix "44")

o Electronic Stores

You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industriesto the NAICS classification system (see NAICS Update Process Fact Sheet, p. 2, section "The Four Principles of NAICS".

Your team leader has asked you to write a short report detailing your findings andrecommending which industry your company should declare as its primary industry (out of the four listed above). Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why "cybersecurity" isconsidered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.

NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports. Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier.

Write:

Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your research summary must include the following:

1. Introduction which includes a well-reasoned explanation as to why "cybersecurity" is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why).

2. Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should include a comparison between your company's business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54).

3. Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports. This recommendation must include your reasons as to why this code is the best fit.

4. A closing section in which you present a summary of the issues regarding the question of whether or not cybersecurity is a separate industry, your recommendation for selection of a NAICS code, and your rationale for your choice.

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #3 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Attachment:- Case-Study-Istherea-Cyber-Security-Industry.rar

Reference no: EM131653507

Questions Cloud

Entropy change of pure substance : What is the entropy change of this pure substance (in SI unit) during the described heating process?
Identify a public health concern that interests you. : Describe what data would be important to know about this concern and how studying public health would be beneficial to addressing it.
Discuss the various aspects of the nervous system : We have explored nerves, nervous tissue and the various aspects of the nervous system
At what time does she reverse direction : At time t=0, when Sally is moving at 15 m/s in the positive direction, she passes a signpost at x =50 m. Her acceleration is a function of time:
Provide advanced threat detection at an affordable price : You recently joined a small start-up company that has developed a suite of cybersecurity products that provide advanced threat detection at an affordable price.
Discuss about an extravert and an introvert : What do you like about being an Extravert or an Introvert
What are some reasons for so much redundancy of action : What are some reasons for so much redundancy of action and so many interacting aspects of immune responses
A ball is observed to fall from a building : A ball is observed to fall from a building, striking the ground below 12.50 s later.
Discuss the four stages of the learning and mastery process : Research values-based-leadership and discuss the four stages of the learning and mastery process.Discuss these concepts in the context of effective healthcare .

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd