The department of defense cyber strategy

Assignment Help Operating System
Reference no: EM132334343

The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.

What does that mean to private organizations such as yours?

If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?

Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations' data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate.

Others will argue that we should not give private information of citizens to the government for any reason. As a citizen, would you feel comfortable with this? As a private organization, would you feel comfortable giving information that may contain your customers' private data to the DoD?

Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?

Attachment:- DEPARTMENT OF DEFENSE CYBER STRATEGY.rar

Reference no: EM132334343

Questions Cloud

Discuss the ethics policy or clinical guideline : Discuss the ethical dilemmas in the case. Discuss the ethics policy or clinical guideline. Discuss how you would have handled dilemma ethically and/or legally
Correlation between gas prices-inflation canadian economy : This article is about the correlation between gas prices and inflation Canadian economy. Inflation refers to the rise in the overall price level.
State children health insurance program : Briefly introduce the State Children's Health Insurance Program (SCHIP) of your state of residence. What kind of services are covered?
Operational relates to the mission of business : Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.
The department of defense cyber strategy : The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
Required lan components and wan technology : A detailed network diagram that shows the three FractalApps offices, the required LAN components, WAN technology and components, and VPN components
Specific governance plan that exists at company : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization
Court interpretation in case involving online protection : Summarizing a court's interpretation in a case involving online protection of a patent. Cite both the case and statute using standard legal notation.
Centralized and decentralized organizational structures : Find actual examples of both centralized and decentralized organizational structures. Create a specific scenario that would be most effective under each setting

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd