Telling private industry how to set up or improve security?

Assignment Help Computer Network Security
Reference no: EM13874550

Answer these questions:

1. How should government justify telling private industry how to set up or improve their cybersecurity?

• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector cybersecurity.

• Clearly discuss the methods of government intervention. That is, what authorities (such as laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry?

• Describe real-world examples that help support your discussion.

2. Clearly discuss the impacts/effects, if any, on national security due to government regulation required to be implemented by private industry.

• Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements.

• Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

• Describe real-world examples that help support your discussion.

Hint: First prepare an outline based on the questions asked in this assignment. The outline is not submitted as part of the final report, but it should be used to help structure your TOC. Also, the introduction should provide a brief preview for the reader, indicating what areas your research explored. Do this for all your research papers, both the individual and the team projects.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The paper must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.

Reference no: EM13874550

Previous Q& A

  Toto company year end balance sheet

Toto Company reports the following on its year end balance sheet:

  Compute expressions for w for both competition and monopoly

Let the total welfare gain from the innovation be given by W = V + S. Compute expressions for W for both competition and monopoly.

  What is the function of the system

What is the function of the system -

  What would you do and why

Assume you are assigned to lead this change. Describe how you would enact the eight stages of Kotter's eight-step model to change the call patterns?

  Sectional balance and power in congress

The fuse which set off the Civil War was lit long before the first shots fired at Fort Sumter. Missouri's request for admission to the Union in 1820 highlighted the concerns and fears held by both the North and the South regarding sectional balance a..

  Accumulated other comprehensive income

Tinman Corporation reports the following balances at the end of the current year:

  Draw boundaries between technological advancement

Where does a society draw boundaries between technological advancement and the cost to that society?  How or has the balance between the benefits of technological innovation and the human cost changed since the Industrial Revolution? I need 300 - 500..

  How would you go about determining the innovation

How would you go about determining whether innovation and the incentives for innovation are becoming more important factors in the performance of firms and industries?

  There were a number of reasons that hitler rose to power

There were a number of reasons that Hitler rose to power. Remember that the depression and a burdensome treaty punished Germany. Was he simply there at the right time or could another German have rallied the masses to do his bidding?

  Prepare the journal entry

Scarecrow, Inc., issues 50,000 shares of $2 par value common stock.

Reviews

Write a Review

 

Similar Q& A

  Describe the integrative functions

Describe the various integrative functions and processes within the information systems area, including databases, systems analysis, security, networking, computer infrastructure, human computer interaction, and Web design.

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  Examine the it support requirements for the employee devices

Examine the IT support requirements for the employee devices. Examine potential security risks, data breaches, and lost devices. Provide guidelines on how these risks could be mitigated.

  Explain the role of intelligence in cyber security

explain the role of intelligence and counterintelligence in cyber security. Your explanation should include both the defensive and offensive aspect; policies that support or interfere; and suggestions, based upon what you have learned in class, t..

  Explain decryption speed

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  Distance vector routing with link state routing

Describe the differences between a repeater, a switch and a router. Why is a router generally more expensive and complex than a switch, and why is a switch generally more complex and expensive than a repeater?

  Greatest it security concern facing businesses today

Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case

  Describe the purpose of a ddos attack

Describe the purpose of a DDoS attack. How is a DDoS attack configured. How can DDoS attacks be detected and prevented. Research the internet for a DDoS attack. Describe the events.

  Creates for system forensics investigators

Explain why you believe the trend of threats targeting large enterprises is rising and what you believe is the greatest tool these hackers have at their disposal. Provide a rationale.

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Develop a security awareness training communication plan

Organizational end users are generally in the background when it comes to protecting the IT infrastructure. As the chief security officer (CSO), develop a security awareness training communication plan for these users

  Describe the cyber attack lifecycle

Describe the cyber attack lifecycle. Describe a bot-net and how it can be used by hackers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd