What does that mean to private organizations

Assignment Help Basic Computer Science
Reference no: EM132876847

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member's assignment grade.

Protecting Critical Infrastructure and the Homeland

The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.

Question 1: What does that mean to private organizations such as yours?

Question 2: If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?

Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations' data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate.

Question 3: Others will argue that we should not give private information of citizens to the government for any reason. As a citizen, would you feel comfortable with this? As a private organization, would you feel comfortable giving information that may contain your customers' private data to the DoD?

Question 4: Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?

Reference no: EM132876847

Questions Cloud

Different data mining algorithms : We focus on deciding whether the results of two different data mining algorithms provides significantly different information
How much should calhoun debit to unrealized holding gain : Calhoun Company appropriately reported a $10,000 debit balance in its Fair Value Adjustment account. How much Calhoun debit to Unrealized holding gain/loss
Write python program to convert temperature : Write a Python program to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.
Happy workers are productive workers : How far do you agree with the statement "happy workers are productive workers"? Please illustrate your reply with reference to an organisation of your choice.
What does that mean to private organizations : If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?
How does culture impacts hr management in global : How does culture impacts HR management in a global organization?
Computer technologies impacted underdeveloped countries : How has the proliferation of internet, online, and computer technologies impacted underdeveloped countries?
Prepare an income statement for the quarter : The department's variable selling expenses are $35 per liner sold. Prepare an income statement for the quarter
Question regarding employee eating a bag of chips : Discussion question regarding employee eating a bag of chips before her shift ends, but pays for it at the end of her shift. She has a medical issue and was wor

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Relationship between squared biases and variances

Assume we have sample of N pairs xi, yi drawn i.i.d. from distribution characterized as given: xi ∼ h(x), design density. Illustrate relationship between squared biases and variances.

  Print the elements of the array on the screen

2. Write a C program using a pointer for keying six integers by the user. The six values are stored in an array using a pointer. Then print the elements of the array on the screen.

  Write piece of code using only one switch

1) Write piece of code using only one switch and no other control structure to read one character and do the following:

  Internet protocol system and get it working

She says she needs someone to come in and fix her voice over Internet Protocol (VoIP) system and get it working.

  Macro running in response to form button

All of the following are events except: a macro running in response to a form button being clicked, changing the data in a cell, clicking on a control button or opening or closing an Excel workbook.

  Significant impact on businesses and industries

We have viewed how Blockchain has made a significant impact on businesses and industries

  Discuss theory that supports your research model

Discuss the theory that supports your research model in terms of your outcomes and predictors of those outcomes. Was it your original theory,

  How much chocolate is a dollar worth

. A bar costs a dollar, and with c coupons you get a free bar. So depending on the value of c, you get more than one bar of chocolate for a dollar when considering the value of the coupons. How much chocolate is a dollar worth (as a function of c)..

  Intellectual property vs the internet

Intellectual property still exists in the age of the Internet and is still protected under the law. we should continue or even strengthen intellectual property

  Result of the height restriction

What proportion of adult women would be excluded from employment as a result of the height restriction?

  Calculate marginal costs

Problem 1. A firm's production function C is given by C (q) = 0:5q 2+2q 1 2 +18, where q is the level of output.

  Binary integer and then shift the bits

If you encode the signed integer -13 into an 8 bit signed binary integer and then shift the bits to the right by two places AND wrap the bits

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd