Discuss the vulnerabilities in the cyber security

Assignment Help Computer Network Security
Reference no: EM13963299

Evaluation of the Global Impact of the Georgia/Estonia Cyber Event

Objective:

Assess and evaluate the global impact of the Georgia/Estonia Cyber Event based upon the application of ethical policies, security practices, theories, and principles. In the report, apply cybersecurity policy, laws, regulations and global concepts to your analysis.

Competencies:

Security Practices, Information literacy/Research skills

Problem solving, Global impact of a Cyber Event

Policy Experience

Individual Assignment

Each student will evaluate the global impact of the coordinated cyber attack directed against either (A) Georgia, OR (B) Estonia. Each student will write a 10-15 page policy brief about the country that was attacked, detailing the best policy and security practices to mitigate the effects from possible future coordinated cyber attacks. If you have any questions, please ask them early in the week so you have enough time to complete this assignment on time.

Students are to

1. Choose a single country (Georgia or Estonia) and discuss only that one country.

2. Students must use sub-headings in their report , including for the Introduction and Reference List.

3. Each report must include discussion of the following topics under Sub-headings

A. Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack event reported in the media for only one country - either Georgia or Estonia (hereinafter called the "Georgia/Estonia" cyber event).

B. Discuss the alternatives, including possible advantages and disadvantages for reducing each named vulnerability and for improving each named security practice or policy, in order to mitigate future cyber events.

C. How should these changes be rolled out or implemented by the national government?

4. Do not include discussion about powers of a theoretical "Cyber Czar".

5. The report should be 10-15 pages. (The reference list is outside of the page limit.)

Support your position with policy, security practice, theories, principles and recommendations based on your own thoughts, examples and cited references.

The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report.

Verified Expert

Reference no: EM13963299

Questions Cloud

How would you overcome the defenses to the alleged breach : Determine the information that you would need to know to best determine if there was a contract. How would you present a case to a court to show your client was the victim of a breach of contract, and how would you overcome the defenses to the all..
What is the resistance of the heating coil : If a lamp has a resistance of 120 ohm when it operates at a power of 1.00 x 10^2 W, what is the potential difference across the lamp?
Paper - terrorist organization : For this paper, pay close attention to the following guidelines. Keep in mind, college-level research and writing is a process that takes time, and you will likely need to write multiple drafts of your work to create a quality paper. Select one te..
Main forms of legal business ownership : Compare and contrast (pros and cons) of the 3 main forms of legal business ownership. (Sole proprietorships, partnerships, and corporations) So, describe each one, and tell us a little about the pros/cons or advantages/disadvantages of each.
Discuss the vulnerabilities in the cyber security : Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack ..
How long is the football in the air : A motorcycle has a velocity of 15 m/s, due south as it passes a car with a velocity of 24 m/s, due north. What is the magnitude and direction of the velocity of the motorcycle as seen by the driver of the car?
Detriment of the public interest : Concern that the manufacturers of harmful products such as tobbacco have influence on law makers to the detriment of the public interest is used as evidence of which criticism of marketing?
Calculate the resistance of a piece of 20-gauge copper wire : A 150-W street lamp is operated for 12 hours a day. How much energy does it take to operate the lamp for 30 days? Express your answer in kilowatt-hours and in joules.
Different levels of quality for a company : The use of price points for reference to different levels of quality for a company's related products is typical of which product mix pricing strategy?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd