Discusses protection of critical infrastructure and homeland

Assignment Help Operating System
Reference no: EM132333123

The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.

What does that mean to private organizations such as yours?

If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?

Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations' data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate.

Others will argue that we should not give private information of citizens to the government for any reason. As a citizen, would you feel comfortable with this? As a private organization, would you feel comfortable giving information that may contain your customers' private data to the DoD?

Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?

 

Reference no: EM132333123

Questions Cloud

What are the benefits of each system : Specialty courts have been created around the country as an alternative to traditional prosecution of cases. These courts focus on mental health, substance.
Do you believe that jury consultants are effective : Jury consultants gained notoriety after their involvement with such high-profile cases as OJ Simpson, Casey Anthony, and George Zimmerman. Some have criticized.
Particular group of followers : Does this mean one may be an effective leader in one situation with a particular group of followers but not in a different situation or with a different group o
How would you advise your local politician regarding issue : Psychologists often provide recommendations regarding criminal justice practices in an effort to implement more effective reforms. Although each state has.
Discusses protection of critical infrastructure and homeland : The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
Name some common features of all religions : What are some of the rituals that religious people use to manipulate the world? What are some ways that people express their relationship to the divine?
Interorganizational relationships : Give an example of an organization that has developed its own ecosystem. Think of a well known international organization and identify some
Describe the microstructure of a typical animal cell : Physiology of Fluid Balance-BN018467–Specification – Edexcel Level 3 BTEC Nationals in Health and Social Care-NQF Level 3.
Do you feel that children should be placed on the registry : Sex offender registries are found in each of the 50 states. In some states, registries also exist for juvenile offenders. Read the article entitled.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd