The department of defense cyber strategy

Assignment Help Operating System
Reference no: EM132334343

The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.

What does that mean to private organizations such as yours?

If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?

Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations' data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate.

Others will argue that we should not give private information of citizens to the government for any reason. As a citizen, would you feel comfortable with this? As a private organization, would you feel comfortable giving information that may contain your customers' private data to the DoD?

Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?

Attachment:- DEPARTMENT OF DEFENSE CYBER STRATEGY.rar

Reference no: EM132334343

Questions Cloud

Discuss the ethics policy or clinical guideline : Discuss the ethical dilemmas in the case. Discuss the ethics policy or clinical guideline. Discuss how you would have handled dilemma ethically and/or legally
Correlation between gas prices-inflation canadian economy : This article is about the correlation between gas prices and inflation Canadian economy. Inflation refers to the rise in the overall price level.
State children health insurance program : Briefly introduce the State Children's Health Insurance Program (SCHIP) of your state of residence. What kind of services are covered?
Operational relates to the mission of business : Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.
The department of defense cyber strategy : The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
Required lan components and wan technology : A detailed network diagram that shows the three FractalApps offices, the required LAN components, WAN technology and components, and VPN components
Specific governance plan that exists at company : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization
Court interpretation in case involving online protection : Summarizing a court's interpretation in a case involving online protection of a patent. Cite both the case and statute using standard legal notation.
Centralized and decentralized organizational structures : Find actual examples of both centralized and decentralized organizational structures. Create a specific scenario that would be most effective under each setting

Reviews

Write a Review

Operating System Questions & Answers

  Write a scholarly review of comparing any two os

Do not select MS WINDOWS. Write a scholarly review of comparing any two or more OS; attach a copy of the article to your postings. Remember.

  Establish shared-memory object between parent and child

the child process must output the sequence of numbers generated from the algorithm specified by the Collatz conjecture because the parent and child have their own copies of the data.

  Having staff with proper skill sets is immensely important

Having staff with the proper skill sets is immensely important to accomplishing corporate objectives. List and support three best practices in staffing future

  Implement a separate memory component

Generate 10,000 requests using the request generation component, and for each request, invoke the appropriate function of the Memory component for each of the memory allocation/deallocation techniques.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  What is the size of the physical memory

What type of memory, virtual or physical, is exhausted when there is a memory leak problem with a process - How much memory has the program used when reaching

  Create the use-case model diagrams

Create the use-case model diagrams for two (2) subjects - Create use-case descriptions for at least two of the use cases you are using in each of your use-case

  Repeating sequence

Assuming least recently used (LRU) replacement for associative caches, evaluate the effective miss rate if the sequence is input to the given caches, ignoring startup effects (i.e., compulsory misses).

  Write bash shell script for number files in directories

Write a bash shell script filestatic. The script should examine the number files in directories given as arguments (parameters) to this script.

  Implementation and effects of different scheduling policies

In this lab we explore the implementation and effects of different scheduling policies discussed in class on a set of processes/threads executing on a system. The system is to be implemented as a Discrete Event Simulation

  Question about lan operating systems

Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.

  Do you think that files are stored in consecutive sectors

All files may grow dynamically during execution without giving the operating system any advance information about their ultimate size. Do you think that files are stored in consecutive sectors? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd