Reference no: EM13963299
Evaluation of the Global Impact of the Georgia/Estonia Cyber Event
Objective:
Assess and evaluate the global impact of the Georgia/Estonia Cyber Event based upon the application of ethical policies, security practices, theories, and principles. In the report, apply cybersecurity policy, laws, regulations and global concepts to your analysis.
Competencies:
Security Practices, Information literacy/Research skills
Problem solving, Global impact of a Cyber Event
Policy Experience
Individual Assignment
Each student will evaluate the global impact of the coordinated cyber attack directed against either (A) Georgia, OR (B) Estonia. Each student will write a 10-15 page policy brief about the country that was attacked, detailing the best policy and security practices to mitigate the effects from possible future coordinated cyber attacks. If you have any questions, please ask them early in the week so you have enough time to complete this assignment on time.
Students are to
1. Choose a single country (Georgia or Estonia) and discuss only that one country.
2. Students must use sub-headings in their report , including for the Introduction and Reference List.
3. Each report must include discussion of the following topics under Sub-headings
A. Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack event reported in the media for only one country - either Georgia or Estonia (hereinafter called the "Georgia/Estonia" cyber event).
B. Discuss the alternatives, including possible advantages and disadvantages for reducing each named vulnerability and for improving each named security practice or policy, in order to mitigate future cyber events.
C. How should these changes be rolled out or implemented by the national government?
4. Do not include discussion about powers of a theoretical "Cyber Czar".
5. The report should be 10-15 pages. (The reference list is outside of the page limit.)
Support your position with policy, security practice, theories, principles and recommendations based on your own thoughts, examples and cited references.
The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report.
How would you overcome the defenses to the alleged breach
: Determine the information that you would need to know to best determine if there was a contract. How would you present a case to a court to show your client was the victim of a breach of contract, and how would you overcome the defenses to the all..
|
What is the resistance of the heating coil
: If a lamp has a resistance of 120 ohm when it operates at a power of 1.00 x 10^2 W, what is the potential difference across the lamp?
|
Paper - terrorist organization
: For this paper, pay close attention to the following guidelines. Keep in mind, college-level research and writing is a process that takes time, and you will likely need to write multiple drafts of your work to create a quality paper. Select one te..
|
Main forms of legal business ownership
: Compare and contrast (pros and cons) of the 3 main forms of legal business ownership. (Sole proprietorships, partnerships, and corporations) So, describe each one, and tell us a little about the pros/cons or advantages/disadvantages of each.
|
Discuss the vulnerabilities in the cyber security
: Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack ..
|
How long is the football in the air
: A motorcycle has a velocity of 15 m/s, due south as it passes a car with a velocity of 24 m/s, due north. What is the magnitude and direction of the velocity of the motorcycle as seen by the driver of the car?
|
Detriment of the public interest
: Concern that the manufacturers of harmful products such as tobbacco have influence on law makers to the detriment of the public interest is used as evidence of which criticism of marketing?
|
Calculate the resistance of a piece of 20-gauge copper wire
: A 150-W street lamp is operated for 12 hours a day. How much energy does it take to operate the lamp for 30 days? Express your answer in kilowatt-hours and in joules.
|
Different levels of quality for a company
: The use of price points for reference to different levels of quality for a company's related products is typical of which product mix pricing strategy?
|