What are public private partnerships

Assignment Help Computer Network Security
Reference no: EM131115068 , Length: 1000 words

Case Study:  Why should businesses participate in Public-Private Partnerships for Cybersecurity?

Case Scenario:

A large regional utility company has been approached by a federally funded research and development organization (FFRDC) which is recruiting companies for participation in a government initiated public-private partnership designed to improve cybersecurity for the energy sector. The utility distributes both natural gas and electricity across a three state area that includes both urban and rural households and businesses. The utility company's board of directors is not familiar with the concept of public-private partnerships. They have hired your small consulting firm to help them make an informed decision. Their biggest question is "What's in this for us?" The second looming question is what types of resources would they be expected to contribute to the effort (e.g. money, personnel, facilities)?

Your immediate (quick response) task is to research and write a three page issues brief which addresses public-private partnerships, the types of cybersecurity improvements which could be addressed by such a partnership, the potential benefits to industry partners, and the potential risks and/or costs in resources.

Please note: if you have written a similar paper or assignment for other courses, you may consult that work but you may NOT reuse it. You must write a new white paper that specifically addresses the requirements of this assignment.

Research:

1. Read / Review the Week 7 readings.

2. Research the concepts and structures for public-private partnerships as a means of furthering public policy goals. Your starting resources are:

a. What are Public Private Partnerships (World Bank) https://ppp.worldbank.org/public-private-partnership/overview/what-are-public-private-partnerships

b. The Policy Cycle https://www.policynl.ca/policydevelopment/policycycle.html

3. Research existing or proposed public-private partnerships in cybersecurity and critical infrastructure protection. Here are some sources to get you started:

a. https://www.insaonline.org/CMDownload.aspx?ContentKey=e1f31be3-e110-41b2-aa0c-966020051f5c&ContentItemKey=161e015c-670f-449a-8753-689cbc3de85e

b. https://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity.Partnerships.pdf

c. https://csis.org/files/publication/130819_tech_summary.pdf

d.

https://www.hsgac.senate.gov/hearings/strengthening-public-private-partnerships-to-reduce-cyber-risks-to-our-nations-critical-infrastructure

e. https://www.hsgac.senate.gov/download/?id=66d59b29-25ac-4dc1-a3af-040dcfe3bd38

f. https://www.hsgac.senate.gov/download/?id=5a70808b-ff76-411d-9075-5b21c7398bf5

4. Research the DHS led public-private partnership for Critical Infrastructure Cybersecurity improvements. You should also review the requirements and provisions of the NIST Cybersecurity Framework for Critical Infrastructure Protection. Find out why DHS is encouraging the adoption of this framework.

a. https://www.dhs.gov/blog/2014/02/12/dhs-launches-c%C2%B3-voluntary-program

b. https://www.us-cert.gov/ccubedvp

c. https://www.us-cert.gov/sites/default/files/c3vp/ccubedvp-outreach-and-messaging-kit.pdf

5. Find additional sources which provide information about public-private partnerships for cybersecurity, i.e. Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations. Here are two overview /directory web pages to help you get started.

a. https://www.dhs.gov/isao

b. https://www.isaccouncil.org/memberisacs.html

Write:

Write a two to three page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for public-private partnershipswhich provides definitions and addresses the laws, regulations, and policies which permit this type of cooperation between federal, state, and local governments and private companies such as your customer (the utility company). This introduction should be suitable for an executive audience.

2. A separate section which provides an overview of public-private partnerships for cybersecurity which addresses the types of activities which the utility company could reasonably be expected to contribute to (cybersecurity activities for energy sector critical infrastructures). You should provide 3 or more specific examples.

3. An analysis of whether or not participation in a public-private partnership is likely to have benefits for the utility company (with specific examples of those benefits). After you address the benefits, address the problem of costs and/or risks which the company could expect to face (with specific examples). (One risk to consider is how much information about company operations could be exposed to the federal government.)

4. A recommendation with justification or rationale for which, if any, existing or proposed public-private partnerships the utility company should consider participating in.

Your white paper should use standard terms and definitions for cybersecurity and privacy. The following source is recommended:

• NICCS Glossary https://niccs.us-cert.gov/glossary

Submit For Grading

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Reference no: EM131115068

Questions Cloud

Fast-tracking and crashing : You’ve done all your analysis, collected the duration estimates from your team, and developed a beautiful project schedule. You provide it to your sponsor or customer and they say? “Get it done faster”, of course. There are two techniques that can be..
Pat third floor apartment balcony : Pat wanted to try the bike out on Sunday on a ride with some friends. Tom told Pat that this was acceptable. On Saturday night, the bike was stolen off Pat's third floor apartment balcony where the bike was unlocked. Discuss whether Pat is liable ..
Describe educational benefit-tuition reimbursement options : Define and describe the educational benefit/tuition reimbursement options in today’s workplace. What are the different designs, delivery systems, tax implications, etc.? Communicating employee benefits is an important part of today’s benefits/human r..
Question regarding the understanding of leadership : 1. What is your understanding of leadership and what is required of a responsible leader in the context of sustainability for today's business environment?
What are public private partnerships : Research the concepts and structures for public-private partnerships as a means of furthering public policy goals - What are Public Private Partnerships
Money to third party without your knowledge or consent : Assume that I have made a contract with someone else to be their attorney and the contract calls for a certain amount of money. I have a right to collect that money. Can I assign a right to collect that money to a third party without your knowledge o..
Practice of public relations textbook : Resource: The Practice of Public Relations textbook,University Library, Internet Select one of the following case studies located in The Practice of Public Relations.
Discuss the relationships between total cost : Discuss the relationships between total cost, output, and the price of labor and capital. Provide examples that illustrate how the prices of inputs affect managerial decisions. Consider, in particular, the current market for fuel and its implicati..
What is the standard error of the mean temperature : Mars Rover Two measures 64 daily high temperatures, and finds that the average of the 64 measurements is -42.5 degrees C. What is the standard error of the mean temperature

Reviews

Write a Review

Computer Network Security Questions & Answers

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Difference between the terms safety and security

What is the difference between the terms ‘safety' and ‘security' and what is the conclusion of the paper?

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Develop an attack tree for stealing a twitter handle

Develop an attack tree for stealing a Twitter handle that encompasses the basics of these attacks, as well as other threat vectors you can think of. Your tree should include at least 25 nodes and be comprehensive

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Question about system maintenance

The 4-types of IT system maintenance also apply to other industries. Assume you were in charge of aircraft maintenance for a small airline.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  What is locking and how is it resolved

Describe the issues that arise from concurrency.

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  How does anti-virus software detect malware

What is a malware? List four harm that malware can cause to an information system. How does Anti-virus software detect malware. What is the difference between Polymorphic and Metamorphic malware. Explain in details the difference between worm and vir..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd