Reference no: EM131086051
TA1 Human Factors, Threats, Culture, Liability
Team Assignment 1:
Course Objective: Analyze the challenges of managing human aspects of cybersecurity, with an emphasis on employees and the insider threat.
Competencies: Team-building skills, valuing diverse perspectives, decision making.
Choose 3 organizations generally in the same industry (3 businesses - large or small, or 3 government agencies, or 3 non-profit organizations) and discuss the effects on each company due to past incidents of cyber crime or cyber espionage.
First describe the mission of each organization, as found on their web site. Discuss how each organization has been targeted in the recent past for cyberattack(s), as reported in news or journal articles. Describe the suspected threat actors. Discuss possible effects of culture that may have influenced these threat actors - possible effects of poverty, religion, poor local law enforcement, or tradition and ethical values. Describe regulatory requirements and describe possible liability issues that may be related to these cyberattacks. How should cyber policy controls be adjusted for each organization to reduce vulnerabilities and prevent disruption or theft due to possible future attacks? Describe trade-offs associated with your policy control recommendations and explain how these might affect the stated mission of each organization.
Relational database query-stored procedure writing
: What do you know about relational databases (e.g. Access, SQL, etc.)? What do you know about relational database query/stored procedure writing?
|
Compare classical labor theory-neoclassical utility theory
: Compare the classical labor theory of value to the neoclassical utility theory of value. How do they differ both in assumptions and implications? Please cite volume and page numbers from Capital when appropriate.
|
Write maple code to automatically generate the pictures
: Write MAPLE code to automatically generate the pictures above from any given polynomial. Use colors to make the picture clear. You will have to hand in the MAPLE code that automatically generated your pictures AND to write a conjecture based on yo..
|
Appropriate surplus value through process of exploitation
: Marx argues that capitalists appropriate surplus value through the process of exploitation. Explain what Marx means by “exploitation” and discuss the various means by which capitalists seek to extract additional surplus from workers. Provide real-wor..
|
Challenges of managing human aspects of cybersecurity
: Course Objective: Analyze the challenges of managing human aspects of cybersecurity, with an emphasis on employees and the insider threat.
|
Price elasticity of demand for farm products is inelastic
: Suppose the price elasticity of demand for farm products is inelastic. If the federal government wants to follow a policy of increasing income for farmers, what type of programs will the government enact?
|
Differences between macroeconomics and microeconomics
: For this assignment you need to identify and describe three differences between macroeconomics and microeconomics. For each of the three examples, give one of the following to help illustrate the difference between microeconomics and macroeconomics: ..
|
The art and science of getting people to spend their money
: We defined marketing as, “the art and science of getting people to spend their money on your product rather than the other guy’s, and be happy that they did so.” Do you think that’s true? Does some Wizard of Oz person-behind-the-curtain get you to bu..
|
Sales are higher in september than in all other months
: Suppose you have the following regression equation where SALES = 100s of cars sold per month, PRICE = average actual price paid by customer for car purchases in month, ADV = monthly advertising expenses, SEPT = dummy variable with value 1 for Sept an..
|