Design effective organization cybersecurity standards

Assignment Help Computer Network Security
Reference no: EM13787864

Develop Skills to design effective organization cybersecurity standards and policies.

Private Sector-Public Sector cybersecurity issues

Some observers say industry compliance with government regulations to improve cybersecurity is necessary to protect consumers and guard economic progress. Others state that regulation is a drag on industry, and actually reduces productivity.

Answer the following questions -- you may use the links provided below to begin your research, but you must find new, additional citations to supplement these to show that you did extra research. You may also want to refer back to discussions and assignments in the previous weeks.

Focus on the goals of private businesses, and the goals of lawmakers for economic progress and economic security

1. Focusing on the goals of private businesses, and the goals of lawmakers for economic progress and economic security, select one example private-sector industry, describe the general business goals by using information on the web sites of one or two business within this industry, and explain why meta-data about customers and consumers is important to businesses within this industry. (here, meta-data means Big-Data collected about consumers to determine customer habits).

2. Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer. Use citations to support your arguments about how some action or result related to collection of meta-data may be harmful to customers.

3. What possible activities should lawmakers consider regulating to control the way that this example industry gathers and uses meta-data?

4. What are the goals of lawmakers in the public sector -- or why should lawmakers think regulating these possible industry activities is useful?

5. What might happen to the goals of this industry, and to the public sector goals, as more new cybersecurity regulations are put in place for business compliance?

Background: Possible effects on innovation due to cybersecurity government regulations --

1. Tech Companies Warn Privacy Rules Will Kill Innovation [2012]

2. Hospitals say Device Manufacturers Resist Boosting Cybersecurity < 

3. U.S. Chamber Leads Defeat of Cybersecurity Bill [2012]

Length 5-7 pages, due at the end of Week 6.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The paper must include: cover page, table of contents, introduction, section headings and  subheadings, conclusions, APA compliant in-text citations and list of references, and page  numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the  document), then the outline should be used to create the Table of Contents and the document  sub headings. The Introduction should briefly preview each sub-heading in the document

Reference no: EM13787864

Questions Cloud

Write a description for three different products or persons : Write a description for three different products or persons. These descriptions should be a maximum of three sentences each (no minimum is required).
Rules of etiquette : 1. The rules of etiquette are
Describe the advantages and disadvantages of free trade : Describe the advantages and disadvantages of free trade. Explain if free trade can ever be fair. Justify your response.
Studying the effect of high blood sugar : Which historical perspective stated that psychologists should study the different components of the mind independently, because to understand how the conscious mind works, we must understand all of its individual parts completely?
Design effective organization cybersecurity standards : Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.
How the social structure set up in colonial latin america : discuss how the social structure set up in colonial Latin America continues to determine life for Indigenous communities today.
Case study—shortage of nurses : Case Study-Shortage of Nurses
Distinct opinion of others within the first : People usually form a distinct opinion of others within the first _______ of meeting them.
Probability of the second flip : Determine the probability that a computer purchased from this retailer has neither a read-write CD nor a DVD drive - Determine the probability that a computer purchased from this retailer does not have a DVD drive.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  What security functions are typically outsourced

What security functions are typically outsourced?

  Create class to maintain personal budget for a year

Create a class to maintain a personal budget for a year. The name of this class is Budget. The data your class will need, at a minimum.

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Basic function / purpose of a firewall

What is the basic function / purpose of a firewall? What are some different firewall implementations (stateful inspection, dual-homed, etc) and how might an organization use firewalls

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Which of the cia goals did tjx fail to achieve in attack

Research the TJX data breach case on the web and answer the following questions.

  Describe and assess impact of these devices on newspaper

Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games,read e-Books, read the news, and perform a myriad of other tasks

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd