Critical need for information security

Assignment Help Basic Computer Science
Reference no: EM131368652

Case Study 1: The Critical Need for Information Security

Download and read the following articles available in the ACM Digital Library:

Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS '11: Military Modeling & Simulation Symposium. Boston, MA.

Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31.

Write a four to five (4-5) page paper in which you:

  1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.
  2. Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three (3) examples.
  3. Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise. Then, evaluate the required roles and functions of Information Technology (IT) personnel that would be required to sustain these best practices.
  4. Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition.
  5. Suggest how public-private partnerships can strengthen cybersecurity efforts and effectiveness in a:

a. Corporate environment

b. Regional level

c. National level 

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length. 

Reference no: EM131368652

Questions Cloud

How your top five strengths relate to your leadership style : Explain how your top five strengths relate to your leadership style. Determine how they relate to the key functions you would need to perform as a manager.
Conduct an online search to learn about the cultural norms : For the purposes of this Discussion, choose a country other than your own and conduct an online search to learn about the cultural norms, business and meeting practices, and values in the country that you select. (Cite your outside sources.)
What is a foreign exchange rate : Practical Application: Foreigners are buying up hundreds of billions of dollars a year in American assets. In what ways should this be a matter of concern to Americans?
What is an overarching strategy : What is an overarching strategy and examples that help to balance the three E's to make work on the LA river a sustainability success. .
Critical need for information security : Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.
How does eleanor roosevelt say the organization has failed : How does Eleanor Roosevelt say the organization has failed.
Discuss the advantages of the european unions reach concept : Discuss the advantages and disadvantages of the European Union's REACH concept for hazard communication. What might be some of the roadblocks to implementing this concept in the United States?
Write a paper on civil war and why it was necessary : Write a paper about the Civil Warand make a argument for why it was necessary. It must be double-spaced (Times New Roman, font size 12), and include a cover page with your name, course number and course title, instructor's name, and date. Paper sh..
What is the country’s current account balance : A country had exports of $100 billion, imports of $90 billion, net transfers from abroad of $10 billion, and $5 billion of net income from foreign investments. What is the country's current account balance?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Graph a model of the cam

Find an equation that translates the model so that the camshaft is at the origin.

  The owners of designit

The owners of DesignIT, who recently purchased 56'x36' space for their expanding business, have asked you to place a bid on a consulting job. DesignIT is a graphic arts company that, up until now, had contracted work out to temporary design services...

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Assignment before accepting the assignment

Please read the entire assignment before accepting the assignment. Assignment 1 - Option 1 (please note this is a Safe Assign project).

  Write a program that calculates the average word length

Write a program that calculates the average word length in a sentence entered by the user.

  Inherent method of tracking state or managing sessions

Session management is used to track user activity, including the login and logout (or the beginning and end of a user session) of a Web application, otherwise known as "state." Because HTTP is a stateless technology, HTTP has no inherent method of tr..

  Deternine the couple mb

the minimum tension in the lower portion of the belt if no slipping is to occur between the belt and the drive drum.

  Number of cpu processing cycles

Taking into account the availability of today's powerful computers, why is programming efficiency important? Consider how the number of lines of programming instructions impact the number of CPU processing cycles?

  What is the balance after 5 years

Martha deposited $15000 in her savings account that earns 3%compounded semi-annually. at the end of 3 years, she deposits an additional $12000 into this accout. What is the balance after 5 years?

  Privacy and security issues are inherent in data storage

Privacy and security issues are inherent in data storage. Let's consider the question of who owns the data about a particular person: medical, credit, personal, financial, consumer information, etc.?

  How would this affect root name server traffic in general

How would this affect root name server traffic in general? How would this affect such traffic for the specific case of resolving a name like cisco into a Web server address?

  Odd-length cycle in directed graph by linear-time algorithm

Give a linear-time algorithm to find an odd-length cycle in a directed graph. You may NOT assume that the graph is strongly connected.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd