Evaluate international cybersecurity policy

Assignment Help Basic Computer Science
Reference no: EM132414572

As a cybersecurity professional, it is important for you to not only understand the organizational and national human and technical factors, but because you will encounter international threats and concerns, it's also important to be able to recognize threats from other countries.
In this project, you are tasked with creating a chart that depicts your recommendations regarding the assessment and evaluation of the cybersecurity threats and policies that can be linked to origins in the Middle East, Europe, Africa, and other regions, including the relevant cultural differences in global security outlooks across these regions. You will base your findings from the view of a consultant to an international company looking to expand in those geographical areas. Generally, what kind of cybersecurity climate will the company encounter?

In your research, focus on a malicious cyber technology or capability (malware) that is specific to the global environment, i.e., Trojans, rootkits, worms, spyware, keystroke loggers, or advanced persistent threats (do not select botnets, as they will be studied separately in this project). Along with your country threat assessments, you must also assess and evaluate the evolution of this malware and recommend how global cybersecurity policies might be used to counter the effects.

You will review the characteristics of your chosen malware by discussing six specific characteristics (purpose, size, attack method, attribution, etc.) and describe how these characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss what contributing factors may cause these characteristics to change, and how these characteristics may change over the next 10 years. How might these technologies be countered by global cybersecurity policy controls (do not describe technology controls) in the future? Support your position with policy, security practice, theories, principles, and recommendations based on your own thoughts, examples, and cited references.

Finally, you will study botnets, which are a specific and particularly pervasive type of malware. You will learn about the global nature of botnets and the emerging security issues associated with botnets, to include their impact on the formulation of global cybersecurity policies.

This is the last of six sequential projects. There are 13 steps in this project. Begin with the information below to review your project scenario.

Scenario

GlobalOutreach is an international company that specializes in risk mitigation, with particular emphasis on cyber risk. You are a consultant to GlobalOutreach, which is looking to expand into the geographical areas of the Middle East, Europe, Africa, and other regions. The company has asked you to provide your thoughts (based on research) on what kind of cybersecurity climate can be expected when expanding to these areas. Your assessment of the global environment will include the identification of specific cyberthreats pervasive in selected regions as well as the identification and characterization of malware in these regions.

You decide to also focus on networked computing systems, which are important to businesses, commerce, and education worldwide, but may be controlled by the global governments that vary from country to country. Botnets, which leverage networks of computers, are a particular global concern, and GlobalOutreach has dedicated research funds to better understanding the propagation of botnets and also how to eradicate them. Networked computing systems are particularly vulnerable to botnets, which can be used in distributed denial-of-service attacks and other malicious purposes.

Your report will highlight cybersecurity policies in three international regions as well as in NATO and the United Nations, representing global alliances, and will then document the impact of your selected malware in the three geographic areas. It will feature the types of malicious activities most widely observed and what they are used for, and will also consider the role of international cybersecurity policies in eradicating the malware.

A comprehensive report will show GlobalOutreach that you are in the best position to advise about global affairs, laying the groundwork for future consulting with the company.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

1. Identify and clearly explain the issue, question, or problem under critical consideration.

2. Evaluate international cybersecurity policy.

3. Evaluate specific cybersecurity threats and the combination of technologies and policies that can counter them.

Attachment:- Project 6.rar

Attachment:- Simplified Indstructions-Project-6 Step 1-9.rar

Attachment:- Simplified Instructions-Project-6 Steps 10-13.rar

Reference no: EM132414572

Questions Cloud

Concept of social engineering attack : Explain the concept of a social engineering attack and the methods you would employ to reduce your organization's exposure to it.
Enterprise architecture and enterprise systems : The relationship between enterprise architecture and enterprise systems.How enterprise architecture-enterprise systems respond and adapt to business environment
Circuit switching and packet switching virtual circuit : What is main difference between Circuit switching and Packet switching Virtual Circuit? Discuss advantages of Packet switching over Circuit Switching-vice versa
Security vulnerability report : A security vulnerability report identifies the areas of the organization that are at risk of losing data, outages, etc.
Evaluate international cybersecurity policy : Evaluate international cybersecurity policy. Evaluate specific cybersecurity threats and the combination of technologies and policies that can counter them.
Describe critical components of cybersecurity architecture : Describe the critical components of a cybersecurity architecture. Be sure it provides defense to protect the organization's data, network, and assets.
United States Supreme Court Carpenter v. United States 2018 : Please run a Google search of the term, "United States Supreme Court Carpenter v. United States 2018."
Responsible for safeguarding computer networks : Cyber security engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.
Compare and contrast RMON with SNMP : Compare and contrast RMON with SNMP. Compare and contrast mobile QoS and network QoS. Explain how QoS has a role in the net neutrality debate.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  For the global financial crisis of 2007- 2008

In your opinion, who is/are the most to blame for the crash? Regulators? Wall Street? Subprime borrowers?

  Calculate the correlation between two variables

Four studies are made to calculate the correlation between two variables: age and income. In each study, the correlation is given as follows

  Confidence interval for the proportion of us

a. Construct a 95% confidence interval for the proportion of U.S. adults for whom math was the favorite subject in school.

  Determining of quality requirements of stakeholders

What are ways to contribute in the development of the quality plan for determining of quality requirements of stakeholders

  Tcp flags are utilized

Provide a detailed description of how each of the following TCP flags are utilized: (In Network Security) SYN (Synchronize) ACK (Acknowledgement)

  Optimal cash return point

What will be its optimal cash return point? (Use 365 days a year. Do not round intermediate calculations and round your answer to 2 decimal places.)

  Official unemployment rate to the second decimal place

Based on this information, calculate the official unemployment rate to the second decimal place (hundredths place). Please show how you got your answer

  Outsourcing that consists of contracting operations

Business-process outsourcing (BPO) is a type of outsourcing that consists of contracting operations and responsibilities of a specific business process

  Creating a function that returns a list with two functions

Rather than using the global variable counter in R's global environment, use a closure, in other words, lexical scoping, to manage a "private" variable that keeps the count of the number of times find Next Position() is called

  Graphical user interface

Design and implement (in Java) a graphical user interface (GUI) program for recording information about a family tree.

  Deriving logging information for chinese wall model

In the example of deriving required logging information for the Chinese Wall model, it is stated that the time must be logged.Why? Explain.

  Describe how the analytics of R are suited for Big Data

Compare the statistical feature of R to its programming features. Describe how the analytics of R are suited for Big Data.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd