Watch the video - global conference on cyber space

Assignment Help Computer Network Security
Reference no: EM131523144

Case Study : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a) read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the "Scenario Based Planning" session at the 2015 Global Conference on Cyber Space.

After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6 mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified.

This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?
Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.
Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131523144

Questions Cloud

Write class called course that represent course taken school : Write a class called Course that represents a course taken at a school. Represent each student using the modified Student class from the previous programming.
What visual effect would result by changing horizontal gaps : Write the lines of code that will define a compound border using three borders. Use a line border on the inner edge, an etched border on the outer edge.
Identifies the number and the characteristics of donors : In addition to your letter, complete a 250-500 word reflection that identifies the number of donors and the characteristics of the donors you selected.
Elements of project integration management : Identify and discuss the six key elements of project integration management. What are the advantages and disadvantages of using a functional structure?
Watch the video - global conference on cyber space : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?
Create an interface called breakable : Imagine a game in which some game elements can be broken by the player and others can't. Create an interface called Breakable that has a method called break.
What do we know about the wells fargo structure : What do we know about the Wells Fargo structure, its human resource approach, and the culture generally, that made this recent scandal possible?
Can a class implement two interfaces : Discuss the manner in which Java passes parameters to a method. Is this technique consistent between primitive types and objects? Explain
Common issues with deployment of hids in an organization : Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Mobile wireless networks

3G Safekeeping model, safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, access points (AP), network admission controller (NAC) and authentication server (AS)

  What are the advantages of complex routing algorithms

Complex routing algorithms are used to maintain routing tables. What algorithms are used, and how do they work? What are the advantages and disadvantages of each? Which ones are most commonly used in today's networks?

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Create and manage a photo album in facebook

Find and friend someone in Facebook. Create and manage a photo album in Facebook. Configure and customize your privacy settings in Facebook.

  Network risk assessment

The key to this assignment is to demonstrate your understanding of the topics for the course, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Review the sample system security plan template in project

Review the sample System Security Plan template in the Project Description area of the classroom. Describe each family control. Include why these controls are required.

  Discuss whether private industry now has a responsibility

Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

  Characteristics of clausewitzs theory of warfare

Characteristics of Clausewitz's Theory of Warfare and compare and contrast the key characteristics of Clausewitz's theory of warfare.

  How do concepts like secure socket layer

How do concepts like secure socket layer

  Analyze current state of insider threats to computer systems

Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems. What are the various profiles of insiders who may compromise your systems?

  Apply division method to calculate hash value of character

How can we apply division method to calculate hash value of character string without using more than constant number of words of storage outside string itself?

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd