Provide evidence that cybersecurity is a distinct industry

Assignment Help Case Study
Reference no: EM131218079

Case Study: Is there a cybersecurity industry?

Case Scenario:

You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price.As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS)code(s)for the "cybersecurity" industry to the company's Website.As you delve into the matter, you quickly discover that there is no NAICS code for a "cybersecurity" industry(see https://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012).After additional research, you learned that the NAICS codes for your company's direct competitors (companies selling similarcybersecurity products) included the following:

• Computer and Electronic Product Manufacturing (NAICS prefix "334")

o Computer Terminal and Other Computer Peripheral Equipment Manufacturing
o Computer Storage Device Manufacturing

• Information Industry (NAICS prefix "51")

o Custom Computer Programming Services
o Software Publishers

• Professional, Scientific, and Technical Services Industry (NAICS prefix "54")

o Computer Systems Design Services
o Electronic Stores

• Retail Trade (NAICS prefix "44")

o Electronic Stores

You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industriesto the NAICS classification system (see NAICS Update Process Fact Sheet, p. 4, section "The Four Principles of NAICS" https://www.census.gov/eos/www/naics/reference_files_tools/NAICS_Update_Process_Fact_Sheet.pdf)

Your team leader has asked you to write a short report detailing your findings andrecommending which industry your company should declare as its primary industry (out of the four listed above). Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why "cybersecurity" isconsidered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.

NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports. Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier.

Research:

1. Read / Review the Week 5 readings. Pay close attention to those readings which provide evidence that "cybersecurity" is, in fact, an industry.

2. Research additional information about industry classifications, why they were developed, and how they are used. Here are some suggested sources:

a. https://www.naics.com/history-naics-code/

b. https://www.naics.com/naicswp2014/wp-content/uploads/2014/10/How_to_Use_NAICS_SIC_Codes_for_Marketing_NAICSAssociation.pdf?

c. https://www.bls.gov/bls/naics.htm

d. https://www.census.gov/eos/www/naics/reference_files_tools/NAICS_Update_Process_Fact_Sheet.pdf (See page 4: "The Four Principles of NAICS" Principles #1 & #2)

3. Find three or more additional sources which provide evidence that "cybersecurity" is or is not a distinct industry.

Write:

Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your summary must include the following:

1. Introduction which includes a well-reasoned explanation as to why "cybersecurity" is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why).

2. Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should include a comparison between your company's business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54).

3. Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports.

Reference no: EM131218079

Questions Cloud

Networked application of your choosing : Write a one-page summary of a networked application of your choosing. Conciseness is more important than comprehensiveness, although you should strive for a balance between both. The definition of a networked application in this instance is relati..
Provide a rationale for each recommendation : As the primary Technical Writer, you have been asked to consider building a blog within the client's new website. Your boss has asked you to write about corporate blogging, make recommendations, and provide a rationale for each recommendation. You..
Research of the country business ethics and values : Based on your research of the country's business ethics and values, how will you manage any conflicts that arise during negotiations? Describe how you will ensure no harm is caused to the business relationship. Ensure the conflict management strat..
National institute of standards and technology : How can the National Institute of Standards and Technology (NIST), help your company create a "best practices" cybersecurity policy? Your discussion should touch upon both the positive and the negative aspects of a well-structured policy. Be sure ..
Provide evidence that cybersecurity is a distinct industry : Find three or more additional sources which provide evidence that "cybersecurity" is or is not a distinct industry. Read the readings. Pay close attention to those readings which provide evidence that "cybersecurity" is in fact, an industry.
Automate maintenance tasks : You would like to automate maintenance tasks when specific events appear in the workstations event logs. Before you create a schedule response to the events, you need to know how often the events occur on each computer. What can you do with window..
What appear to be the goals of this hate group : Locate a hate group on the World Wide Web. Include the name of the group and the URL.
Write a paragraph describing at least two reasons : The IPv6 Network Addressing Standard was published back in 1998. Write a paragraph describing at least two reasons why the conversion to IPv6 has not been completed.
Cases for a university library borrowing system : Create a set of use cases for a university library borrowing system. (Do not worry about catalogue searching, etc.) The system will record the books owned by the library and will record who has borrowed what books.

Reviews

Write a Review

Case Study Questions & Answers

  Enter the opening balances to the general ledger

Please note that GST free items are bank fees, salaries and wages, interest expense, superannuation and fines - you can check with your lecturer for others - Modify the chart of accounts as required to ensure that the transactions affecting the co..

  What is the cdc''s procedure for mass immunizations

What is the CDC's procedure for mass immunizations that are necessary for certain types of infectious outbreaks such as influenza, mumps, and tetanus?

  Who then customize and distribute the products to quality

who then customize and distribute the products to quality assurance labs for their sensitive test equipment. The yearly volume of output is 15,000 units.

  What about sias system for measuring service quality

Should the company change its advertising campaign? Why or why not - what about SIA's system for measuring service quality?

  What are the central facts of the case

What are the central facts of the case. What are the major overriding issues in this case. What sub-issues or related issues are present in the case that merit consideration, discussion, or action

  What is the minimum expected loss

What action should the firm pursue in order to minimize expected loss? What is the minimum expected loss?

  Explain the main factors that you should consider

Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet - Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision..

  What type of job evaluation did canada post use

What type of job evaluation did Canada Post use? What are the advantages and limitations of this system

  Write a clear explanation of the relevant theories

Case Study: Compensation Controveries at AIG. Write a clear explanation of the relevant theories and demonstrate critial thinking skills in your own words.

  What are the critical issues of this case

Case Study- Mothers Work Inc. What are the critical issues of this case? Which issues should Mothers Work confront first

  What is geographical spread of your potential participants

What is the geographical spread of your potential participants? Are there any specific inclusion criteria for selecting participants? Is so, briefly explain the criteria.

  Draw a map of the supply chain for leapfrog

Draw a map of the supply chain for LeapFrog, including the retailers, Capable Toys, and suppliers of key materials (i.e., Trek). Which supply chain partners are upstream of LeapFrog?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd