How to set up or improve their cyber security

Assignment Help Computer Network Security
Reference no: EM13754536

Cybercrime Law, Regulation, Effects on Innovation

Course Objective: Research cybersecurity laws, regulations and legal concepts, and relate them to managerial decisions needed to protect national security.

Answer these questions:

1. How should government justify telling private industry how to set up or improve their cyber security?

• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector cybersecurity.

• Clearly discuss the methods of government intervention. That is, what authorities (such as laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry?

• Describe real-world examples that help support your discussion.

2. Clearly discuss the impacts/effects, if any, on national security due to government regulation required to be implemented by private industry.

• Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements.

• Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

• Describe real-world examples that help support your discussion.

Reference no: EM13754536

Questions Cloud

Discuss the terms abstraction and representational : Define and discuss the terms "abstraction," "representational," and "nonrepresentational" in relation to two works of art per term.
Explain the potential benefits that the system offers : Make sure you explain why you are making each recommendation and explain the potential benefitsthat the system offers. Also include any potential concerns or issues that must be considered before selecting a system
How you use a computer application for accounting : How do you feel your comprehension of a manual system benefits how you use a computer application for accounting
Are the principles of job crafting described above relevant : 1. Why do you think many people are in jobs that are not satisfying? Do organizations help people craft satisfying and motivating jobs, and if not, why not?. Think about how you might reorient yourself to your own job. Are the principles of job craft..
How to set up or improve their cyber security : How should government justify telling private industry how to set up or improve their cyber security
What is the allocated cost of packaging the cupcakes : Sara's Cake Company has a total activity rate of $2 when packaging a box of 12 cupcakes. If the company bakes a total of 300 cupcakes, using 3 ovens, what is the allocated cost of packaging the cupcakes?
What is the activity rate of baking the cakes per oven : Linda's Cake Company baked 660 cakes last month at a cost of $4.50 a cake. She sold the cakes for $12 a cake. Using 3 ovens, what is the activity rate of baking the cakes per oven?
Make a recommendation for a government regulation : Make a recommendation for a government regulation, or law that you would like to see enacted. Think of the consequences (good and bad) of the proposed regulation or law that you have suggested to businesses, and to consumers. Consider any unintended ..
What is the sales volume variance : Sara's Cake Company had static budget sales of $25,000, flexible budgeted sales of $32,000, and actual sales of $36,000. The static budget variance is $9,000. What is the sales volume variance?

Reviews

Write a Review

Computer Network Security Questions & Answers

  What will be your plan to enhance your network security

Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will..

  Discuss briefly the use of inheritance blocking and forcing

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

  Explaining secure protocol

Assume that Alice shares a secret s with her company's server computer. When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Fiat-shamir protocol for entity authentication

What is the probability that a dishonest claimant is falsely verified as an authentic entity, i.e., what is the probability that the dishonest claimant responds correctly to all 9 challenges?

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Problems of hacking

Question 1: Describe what hacking of memory or hacking of RAM means. Question 2: Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Describe how an one­way hash function can prevent attack

Describe how Alice can cheat and describe how an one­way hash function can prevent this attack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd