Response to cybersecurity challenges in cyberspace

Assignment Help Management Information Sys
Reference no: EM131895656

Case Study : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a)read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the"Scenario Based Planning" session at the 2015 Global Conference on Cyber Space.

After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies.

Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space.

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30

ii. 5:35:30 - 5:41:30

iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business.

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces.

Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A separate section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified.

This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

5. A separate closing section in which you summarize the issues and recommendations for improving global cooperation to respond to cybersecurity challenges in cyberspace.

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Additional Information

Youare expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements.

Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131895656

Questions Cloud

Confidence interval for the population proportion : Find the margin of error for a 95% confidence interval for the population proportion who applied for football tickets.
What is the mean the number of oranges purchased : a. What is the mean the number of oranges purchased? b. What is the standard deviation for the number of oranges purchased?
Prepare a powerpoint to present to the audience : Summarize the effects of some of the main neurotransmitters in the brain, and list four hormones that influence behavior. Your PowerPoint presentation
Mean hourly wage for residents of the town : The table shows, for the years 1997-2012, the mean hourly wage for residents of the town of Pity Me and the mean weekly rent paid by the residents.
Response to cybersecurity challenges in cyberspace : Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies.
Find the equation of the regression line for given data : a. Find the equation of the regression line for the given data. Round the regression line values to the nearest hundredth.
Where is the us economy in the cycle : A short paper that sets out your view of recent US macroeconomic performance and the prospects for the US economy looking forward.
Labrador what is the probability : If the dog hairs on suspect are from the Labrador what is the probability hat their mean cross-sectional diameter is between 25 and 27?
What proportion of the observations : What proportion of the observations is in the interval 40.3 to 115.9?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Design a robust security plan for the company

Design a robust security plan for the company. Design a code of ethics related to the IT profession that can be applied at the company. Design a end user security awareness program.

  How has technological advancements changed the landscape

How has Technological Advancements changed the landscape of the contemporary business world? Eg: Smart Phones; I-Pads; laptops; Wireless Communications etc.

  Discuss about the behavioral and attitudinal vulnerabilities

The probability of a risk is not the only metric in determining what risks to mitigate. The cost and time associated with the risk, and the overall impact to the organization are some of the factors that must be considered as well.Think about the ..

  Are there any issues concerning effectively working as team

MGMT302- Is the amount of written assignment for the course too little, just about right, or too much? Please provide comments. How is your teamwork going? Are there any issues concerning effectively working as a team?

  Crack hash values in order to recover the original word

Given 5 different hash values. Crack those hash values in order to recover the original word that was used to produce those hashes in the first place.

  Design research on a topic about cloud computing

Select five papers about Cloud Computing, Using the method of exploratory design, design your research on a topic about Cloud Computing

  Explain policies and standards that govern health it

Explain policies and standards that govern health IT. Evaluate the policies that aim to improve health through the use of health information management.Evaluate the issues that surround system design and development. Discuss the importance of data st..

  How you think the it profession will change in the future

Analyze how you think the IT profession will change in the future, based on your current understanding of IT as a profession. In your analysis, explain where you think the IT profession (in general) will be in 10, 20 and 50 years from now. Also, e..

  Create an implementation plan for the integration of a mis

With the implementation of business analytics, an organization will also need to implement a good information systems plan in order to collect.

  Domestically innovative technologies

Domestically Innovative Technologies vs Imported Technologies - Prepare and outline for my Directed Study Project and require to submit an outline for my topic

  Which of these programs are dbms products

Microsoft offers free licenses of certain software products to students at colleges and universities that participate in the Microsoft Developer Network.

  List and briefly describe the four parts of typical e-mails

List and briefly describe the four parts of typical e-mails. Suggest at least ten pointers that you could give to a first-time e-mail user.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd