Design effective organization cybersecurity standards

Assignment Help Computer Network Security
Reference no: EM13787864

Develop Skills to design effective organization cybersecurity standards and policies.

Private Sector-Public Sector cybersecurity issues

Some observers say industry compliance with government regulations to improve cybersecurity is necessary to protect consumers and guard economic progress. Others state that regulation is a drag on industry, and actually reduces productivity.

Answer the following questions -- you may use the links provided below to begin your research, but you must find new, additional citations to supplement these to show that you did extra research. You may also want to refer back to discussions and assignments in the previous weeks.

Focus on the goals of private businesses, and the goals of lawmakers for economic progress and economic security

1. Focusing on the goals of private businesses, and the goals of lawmakers for economic progress and economic security, select one example private-sector industry, describe the general business goals by using information on the web sites of one or two business within this industry, and explain why meta-data about customers and consumers is important to businesses within this industry. (here, meta-data means Big-Data collected about consumers to determine customer habits).

2. Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer. Use citations to support your arguments about how some action or result related to collection of meta-data may be harmful to customers.

3. What possible activities should lawmakers consider regulating to control the way that this example industry gathers and uses meta-data?

4. What are the goals of lawmakers in the public sector -- or why should lawmakers think regulating these possible industry activities is useful?

5. What might happen to the goals of this industry, and to the public sector goals, as more new cybersecurity regulations are put in place for business compliance?

Background: Possible effects on innovation due to cybersecurity government regulations --

1. Tech Companies Warn Privacy Rules Will Kill Innovation [2012]

2. Hospitals say Device Manufacturers Resist Boosting Cybersecurity < 

3. U.S. Chamber Leads Defeat of Cybersecurity Bill [2012]

Length 5-7 pages, due at the end of Week 6.

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

The paper must include: cover page, table of contents, introduction, section headings and  subheadings, conclusions, APA compliant in-text citations and list of references, and page  numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the  document), then the outline should be used to create the Table of Contents and the document  sub headings. The Introduction should briefly preview each sub-heading in the document

Reference no: EM13787864

Questions Cloud

Write a description for three different products or persons : Write a description for three different products or persons. These descriptions should be a maximum of three sentences each (no minimum is required).
Rules of etiquette : 1. The rules of etiquette are
Describe the advantages and disadvantages of free trade : Describe the advantages and disadvantages of free trade. Explain if free trade can ever be fair. Justify your response.
Studying the effect of high blood sugar : Which historical perspective stated that psychologists should study the different components of the mind independently, because to understand how the conscious mind works, we must understand all of its individual parts completely?
Design effective organization cybersecurity standards : Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.
How the social structure set up in colonial latin america : discuss how the social structure set up in colonial Latin America continues to determine life for Indigenous communities today.
Case study—shortage of nurses : Case Study-Shortage of Nurses
Distinct opinion of others within the first : People usually form a distinct opinion of others within the first _______ of meeting them.
Probability of the second flip : Determine the probability that a computer purchased from this retailer has neither a read-write CD nor a DVD drive - Determine the probability that a computer purchased from this retailer does not have a DVD drive.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd