Watch the video - global conference on cyber space

Assignment Help Computer Network Security
Reference no: EM131523144

Case Study : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a) read the International Chamber of Commerce's Cybersecurity Guide for Business and (b) watch three scenario segments from the "Scenario Based Planning" session at the 2015 Global Conference on Cyber Space.

After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

1. Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

a. Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on "Scenario Based Planning" menu item in lower left hand corner of video at startup).

b. The three "scenario videos" (approx. 6 mins each) occur at the following times in the livestream channel recording:

i. 5:11:00 - 5:17:30
ii. 5:35:30 - 5:41:30
iii. 6:05:30 - 6:12:10

c. End of Session is at 6:28:00

2. Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business

3. Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

2. A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the "global" companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

3. A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

4. A closing section ("Recommendations") in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified.

This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?
Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.
Additional Information

1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131523144

Questions Cloud

Write class called course that represent course taken school : Write a class called Course that represents a course taken at a school. Represent each student using the modified Student class from the previous programming.
What visual effect would result by changing horizontal gaps : Write the lines of code that will define a compound border using three borders. Use a line border on the inner edge, an etched border on the outer edge.
Identifies the number and the characteristics of donors : In addition to your letter, complete a 250-500 word reflection that identifies the number of donors and the characteristics of the donors you selected.
Elements of project integration management : Identify and discuss the six key elements of project integration management. What are the advantages and disadvantages of using a functional structure?
Watch the video - global conference on cyber space : How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?
Create an interface called breakable : Imagine a game in which some game elements can be broken by the player and others can't. Create an interface called Breakable that has a method called break.
What do we know about the wells fargo structure : What do we know about the Wells Fargo structure, its human resource approach, and the culture generally, that made this recent scandal possible?
Can a class implement two interfaces : Discuss the manner in which Java passes parameters to a method. Is this technique consistent between primitive types and objects? Explain
Common issues with deployment of hids in an organization : Based on your research, what are some of the most common issues with deployment of HIDS in an organization with 1000s of computers?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd