How do political element within the us affect cyber security

Assignment Help Computer Network Security
Reference no: EM131651131

Assignment

You will compile a Final Project that consist of a Frequently Asked Questions (FAQ) document, a presentation, and a storyboard that reflects knowledge you have obtained over the course. This week you will create a FAQ and a storyboard. In Week Five you will complete a presentation and compile the Final Report.

Resources:

The Lynda video "Word 2016 Essential Training" with David Rivers

"Sketch and Storyboard" from Lesson 2, "Story Structure," in the Lynda video "Data Visualization: Storytelling" with Bill Shander

Write a 175-to 350-word FAQ document using Microsoft Word in response to the following:

Scenario One: You are preparing for a new company-wide project to implement cloud technology. In preparation for the project rollout, the VP of Information Technology has asked you to prepare a FAQ document describing cyberspace and its associated complexities for all staff so they understand cyberspace, and cloud technology. The U.S.-based company has 100,000 staff members and offices in 100 countries. Your task is to, in the form of an FAQ, provide answers to the following:

What are the definition of cyberspace, and the maritime, space, and physical domains? Provide a concise description of cyberspace and the maritime, space, and physical domains

How do international laws affect citizens and companies in the U.S.? Accurately describe how international laws affect citizens and companies in the U.S.

How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security

Why is cyber security so complex in cloud technology? Concisely explain the complexities of cyber security in cloud technology

What advantages can cloud technology offer to businesses? Describe at least two advantages cloud technology can offer businesses

Scenario Two: You have recently been hired as a Cybersecurity Intern with a medium size company that has been growing very rapidly. The company supports outreach to the community and has set up a forum to help high school students understand important concepts in security. Your boss has asked you to set up a storyboard that will be used to present to the students to highlight the differences between espionage, intelligence gathering, and cyber warfare. He also wants you to help them understand the physical assets of the Cyber Domain. If you are successful with the storyboard, your boss plans to turn this into an infomercial.

Develop a 6- to 8-slide/panel storyboard document using Microsoft Word or PowerPoint. Your storyboard should:

Accurately depict the differences between espionage, intelligence gathering, and cyber warfare at a level that high school students can relate to-

Accurately describe the influence the military has had on intelligence gathering, cyber warfare, and physical assets

Provide a complete timeline of a recent incident involving personal privacy including the nature of the attack, and providing insight into the risks of conducting business in cyberspace

Enumerate at least five physical assets of the Cyber Domain, including an explanation of why you included the assets

Examine where we are today in the areas of espionage, intelligence gathering, cyber warfare, and physical assets, and offer a prediction of the future given your current perspective

All references need to adhere to APA guidelines, and images should not be copied unless author permission is obtained or copyright free images are used.

Reference no: EM131651131

Questions Cloud

Which bread type has the highest average daily demand : Zepolle's Bakery makes a variety of bread types that it sells to supermarket chains in the area. One of Zepolle's problems is that the number of loaves.
Whats your reading about the legal system : Read the article above and provide your thoughts on how this might relate to Forensic Accounting - An outrageous pardon and a hollow Congress
Problems for some residents in the district nearby city : So the smelters use alumina as an input, but its use leads to emissions of aluminium flourides (F) as particulates into the air
Find difference between the opening and closing stock prices : Calculate the difference between the opening and closing stock prices for GE over this time period. Then calculate the mean, median, and standard deviation.
How do political element within the us affect cyber security : How do political elements within the U.S. affect cyber security? Accurately describe how political elements within the U.S. can affect cyber security?
How much should the firm be willing to pay to undertake : How much should the firm be willing to pay to undertake this investment? Explain.
Calculate the standard deviations of the salaries : Pay Scale is a source of online compensation information, providing access to accurate compensation data for both employees and employers.
Examine the employment issues presented in the scenario : Analyze whether the employee qualifies as an employee or independent contractor - Discuss whether Dream Massage has potentially violated
What is the role of entrepreneurship in production : What is the role of entrepreneurship in production? What are the key reasons for income inequality in USA?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd