Challenges of managing human aspects of cybersecurity

Assignment Help Basic Computer Science
Reference no: EM131086051

TA1  Human Factors, Threats, Culture, Liability

Team Assignment 1:

Course Objective: Analyze the challenges of managing human aspects of cybersecurity, with an emphasis on employees and the insider threat.

Competencies: Team-building skills, valuing diverse perspectives, decision making.

Choose 3 organizations generally in the same industry (3 businesses - large or small, or 3 government agencies, or 3 non-profit organizations) and discuss the effects on each company due to past incidents of cyber crime or cyber espionage.  

First describe the mission of each organization, as found on their web site.  Discuss how each organization has been targeted in the recent past for cyberattack(s), as reported in news or journal articles.  Describe the suspected threat actors.  Discuss possible effects of culture that may have influenced these threat actors - possible effects of poverty, religion, poor local law enforcement, or tradition and ethical values.   Describe regulatory requirements and describe possible liability issues that may be related to these cyberattacks.  How should cyber policy controls be adjusted for each organization to reduce vulnerabilities and prevent disruption or theft due to possible future attacks?  Describe trade-offs associated with your policy control recommendations and explain how these might affect the stated mission of each organization.

Reference no: EM131086051

Questions Cloud

Relational database query-stored procedure writing : What do you know about relational databases (e.g. Access, SQL, etc.)? What do you know about relational database query/stored procedure writing?
Compare classical labor theory-neoclassical utility theory : Compare the classical labor theory of value to the neoclassical utility theory of value. How do they differ both in assumptions and implications? Please cite volume and page numbers from Capital when appropriate.
Write maple code to automatically generate the pictures : Write MAPLE code to automatically generate the pictures above from any given polynomial. Use colors to make the picture clear. You will have to hand in the MAPLE code that automatically generated your pictures AND to write a conjecture based on yo..
Appropriate surplus value through process of exploitation : Marx argues that capitalists appropriate surplus value through the process of exploitation. Explain what Marx means by “exploitation” and discuss the various means by which capitalists seek to extract additional surplus from workers. Provide real-wor..
Challenges of managing human aspects of cybersecurity : Course Objective: Analyze the challenges of managing human aspects of cybersecurity, with an emphasis on employees and the insider threat.
Price elasticity of demand for farm products is inelastic : Suppose the price elasticity of demand for farm products is inelastic. If the federal government wants to follow a policy of increasing income for farmers, what type of programs will the government enact?
Differences between macroeconomics and microeconomics : For this assignment you need to identify and describe three differences between macroeconomics and microeconomics. For each of the three examples, give one of the following to help illustrate the difference between microeconomics and macroeconomics: ..
The art and science of getting people to spend their money : We defined marketing as, “the art and science of getting people to spend their money on your product rather than the other guy’s, and be happy that they did so.” Do you think that’s true? Does some Wizard of Oz person-behind-the-curtain get you to bu..
Sales are higher in september than in all other months : Suppose you have the following regression equation where SALES = 100s of cars sold per month, PRICE = average actual price paid by customer for car purchases in month, ADV = monthly advertising expenses, SEPT = dummy variable with value 1 for Sept an..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Perform bonferroni or another multiple comparisons procedure

In a similar manner, two loaves were stored for three, ?ve, and seven days before measurements were taken. The units are milligrams of vitamin C per hundred grams of ?our (mg/100 g).10 Here are the data:Explain why it is inappropriate to perform ..

  Network layer and the data link layer

The source and destination are connected through two intermediate routers. During the data transmission from source to destination how many times each packet has to visit the network layer and the data link layer?

  The cost of painting and installing carpet

Write an algorithm (in Pseudocode) for a program that computes the cost of painting and installing carpet in a room. Assume the room has one door, one windows and one bookshelf (built into the wall and not painted). Your program should do the foll..

  What extra constraints are required on the relation

What extra constraints are required on the relation advisor to ensure that the one-to-one cardinality constraint is enforced?

  What types of threats does the tool mitigate?

At work, keeping your data safe and your computers up and running is your primary concern. What can employees do to protect against intrusion and attacks?

  Assume the sequence numbers are properly sized

What suggestions would you make to your colleague to fix the protocol? Assume the sequence numbers are properly sized.

  Describe the steps in the keypad polling routine

What distinguishes a control data value from a character data value for the LCD module. Describe the steps in the keypad polling routine

  Performing a security assessment of the seven domains

Apply all your knowledge in regards to submitting an outline for performing a security assessment of the seven domains of a typical IT infrastructure for a client.

  Present the survey methodology and sampling frame

Describe various survey methods to collect Primary Data. Note you can use different methods to collect Data from different Sources. What Sampling methods would you like to use to collect Primary Data. Note, you can use different sampling methods fo..

  Factoring is the problem of computing

Consider the one time pad encryption scheme to encrypt a 1-bit message. Replace the XOR operation with another operation X. For which X does the resulting scheme satisfy perfect secrecy?

  Find the fraction of the conversion

Hint: use the logical operators to combine the 3 pins into one number, then divide that number by 8 (23) to find the fraction of the conversion and multiply that by 5V which would be the Arduino operating voltage.

  Problem regarding the joint-cost function

A company produces x units of commodity A and y units of commodity B each hour. The company can sell all of its units when commodity A sells for p=80-10x dollars per unit and commodity B sells for q=100-4y dollars per unit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd