Why cybersecurity is considered an industry

Assignment Help Management Information Sys
Reference no: EM131895650

Case Study : Is there a cybersecurity industry?

Case Scenario:

You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price.

As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials.

Today, your tasks include adding the North American Industry Classification System (NAICS)code(s)for the "cybersecurity" industry to the company's Website.

As you delve into the matter, you quickly discover that there is no NAICS code for a "cybersecurity" industry. After additional research, you learned that the NAICS codes for your company's direct competitors (companies selling similarcybersecurity products) included the following:

• Computer and Electronic Product Manufacturing (NAICS prefix "334")

o Computer Terminal and Other Computer Peripheral Equipment Manufacturing

o Computer Storage Device Manufacturing

• Information Industry (NAICS prefix "51")

o Custom Computer Programming Services

o Software Publishers

• Professional, Scientific, and Technical Services Industry (NAICS prefix "54")

o Computer Systems Design Services

o Electronic Stores

• Retail Trade (NAICS prefix "44")

o Electronic Stores

You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industriesto the NAICS classification system.

Your team leader has asked you to write a short report detailing your findings andrecommending which industry your company should declare as its primary industry (out of the four listed above).

Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why "cybersecurity" isconsidered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.

NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports.

Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier.

Research:

1. Read / Review the Week 5 readings. Pay close attention to those readings which provide evidence that "cybersecurity" is, in fact, an industry.

2. Research additional information about industry classifications, why they were developed, and how they are used. Here are some suggested sources:

  • North American Industry Classification System (NAICS) at BLS
  • History of the NAICS Code
  • NAICS Update Process Fact Sheet

3. Find three or more additional sources which provide evidence that "cybersecurity" is or is not a distinct industry.

Write:

Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your research summary must include the following:

1. Introduction which includes a well-reasoned explanation as to why "cybersecurity" is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why).

2. Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should include a comparison between your company's business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54).

3. Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports. This recommendation must include your reasons as to why this code is the best fit.

4. A closing section in which you present a summary of the issues regarding the question of whether or not cybersecurity is a separate industry, your recommendation for selection of a NAICS code, and your rationale for your choice.

Reference no: EM131895650

Questions Cloud

Where is the us economy in the cycle : A short paper that sets out your view of recent US macroeconomic performance and the prospects for the US economy looking forward.
Labrador what is the probability : If the dog hairs on suspect are from the Labrador what is the probability hat their mean cross-sectional diameter is between 25 and 27?
What proportion of the observations : What proportion of the observations is in the interval 40.3 to 115.9?
Find the probability of drawing 2 red and 3 white marbles : A jar contains 5 red, 6 white and 7 blue marbles. 5 marbles are randomly selected from the jar. Find the probability of drawing 2 red and 3 white marbles.
Why cybersecurity is considered an industry : Introduction which includes a well-reasoned explanation as to why "cybersecurity" is considered an industry by many reporters and market analysts.
Transforms ordinary iron into a kind of super iron : A new process has been developed that transforms ordinary iron into a kind of super iron called metallic glass. This new product is stronger
Confidence interval for the proportions the population : A survey of 453 citizens found that 347of them favor a new bill introduced by the city/ We want to find a 95% confidence interval for the proportions.
Standard deviation of the sampling distribution : What is the standard deviation of the sampling distribution?
Conduct a swot analysis for your company : COMPETITION – MARKET RESEARCH MANAGER ANALYSIS - Based on your SWOT analysis, do think that Target or Walmart is better positioned over the long term

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research essay about software defined networking

Research essay about Software defined networking (SDN) (company CiscoSDN) and make a 2 pages outline in this picture substances.

  Compare and contrast accessing the internet via a modem dsl

compare and contrast accessing the internet via a modem dsl a cable modem and satellite. identify which of these access

  Evaluate the process of system development life cycle

evaluate the process of system development life cycle sdlcfind the process of system development life cycle sdlc.

  Explain the importance of it and systems in businesses today

Read the article titled "Using Email Safely". Explain the importance of information technology and systems in businesses today.

  Impact of information technology on business1 we are all

impact of information technology on business1. we are all quite aware of the impact of information technology on

  Examine the major benefits for an organization to use ssds

Examine the major benefits for an organization to use SSDs. Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs

  Prepare a checklist to ensure section 404 compliance

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

  Identify the primary differences between wi-fi and wimax

Discuss some of the advantages and disadvantages of using cloud computing.Identify the primary differences between Wi-Fi and WiMax.

  Promote the use of their information technology products

Is it ethical for IT vendors such as Google to promote the use of their information technology products in pursuit of political revolutions in various countries

  What steps must employees take before leaving

Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. What steps must employee..

  Find recent article related to issues surrounding it mergers

Find a recent article related to issues surrounding IT mergers or implementation of a new technology in an organization and describe how they were resolved or handled. You can use an example of issues in your own organization and how they were so..

  Determine the wacc given the above assumptions

Determine the WACC given the above assumptions. Indicate how these might be useful to determine the feasibility of the capital project. Recommend which is more appropriate to apply to project evaluation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd