Worry about all of that cybersecurity stuff

Assignment Help English
Reference no: EM131091112

Exam part 2 - Essay Questions

These questions require longer answers than the short answer questions, and there may be no single correct answer for the question. For that reason, your explanation is more important than a specific answer.

Each question indicates the expected length of your answer, assuming that your answer is not repetitive of itself or of the question. If your answer is shorter than indicated, points will be deducted as follows:

* If it is short by between 1 and 50 words, 5 points will be deducted.
* If it is short by between 51 and 100 words, 10 points will be deducted.
* And so on

You will not lose points for writing answers that are longer than indicated, the maximum length is just to indicate how long of an answer is necessary to be complete.

Spellcheck and proofread your answers carefully. One free typo per question, after that each typo will result in a deduction of one point, up to five points per question.

You are not allowed to include direct quotes from any source in your answers to the essay questions. Everything you submit must be in your own words.

Question 1. The United States has essentially taken the position that the acceptability of cyber espionage depends upon the motivation of the espionage and what is done with the stolen information. This is most obvious in the United States position towards China's espionage activities.

What does the United States believe is an appropriate motivation for espionage, and what is inappropriate? Your answer must include an example of each.

(your answer to this question should be 100-200 words)

Question 2. You are in charge of IT for an electric utility. The CEO of the company suggests disconnecting the company's computer network from the internet so that you don't have to worry about all of that "cybersecurity stuff". Describe two reasons why you would still have to worry about all of that cybersecurity stuff.

(your answer to this question should be 100-200 words)

Question 3. Explain whether you believe the following statement to be true, and why or why not? Countries are unlikely to attack the United States in cyberspace because they fear that the United States will retaliate with cyberattacks against them.

(your answer to this question should be 100-200 words)

Question 4. You have been hired by a presidential candidate as a cybersecurity advisor. Write an essay for the candidate proposing what you believe is the most important action/policy/law the candidate should pursue (if elected) to improve cybersecurity in the United States.

Your essay must include the following:
* A description of the proposal.
* What effect would implementing the proposal have - how would it improve cybersecurity?
* Which of the three elements of deterrence is the proposal most closely related to?
* Identify at least one cyber attack we have read about this quarter where the proposal would make the attack less likely to happen, and explain why.

(your answer to this question should be 250-350 words)

Reference no: EM131091112

Questions Cloud

How the above run times change when cut-through routing : determine how the above run times change when cut-through routing is used.
How the algorithm needs to be modified : Show how the algorithm needs to be modified when only n /2 processes are available.
Common sales strategies and their effect on the buyer : Purpose: To recognize common sales strategies and their effect on the buyer; and analyzes the salesperson's tactics using material from class. You will be provided with a list of what you are looking for during the interaction.
What is the efficiency function of your scheme : What is the is o efficiency function of your scheme?
Worry about all of that cybersecurity stuff : These questions require longer answers than the short answer questions, and there may be no single correct answer for the question. For that reason, your explanation is more important than a specific answer.
Compute the average height of the binary tree : Compute the average height of the binary tree generated by the algorithm.
Is this better than the median scheme described in the text : Is this better than the median scheme described in the text
Play to adapt and provide a brief explanation : Decide on a play to adapt and provide a brief explanation of why you chose this particular play and justification for your creative vision. This must be considered alongside the themes you've identified as informing your vision and those that yo..
How does the performance change in the absence : how does the performance change in the absence of barrier synchronization?

Reviews

Write a Review

English Questions & Answers

  Write an essay about sixth mediation

Write an essay about "Sixth Mediation".

  Write summary of why you are at risk of phishing attacks

Write a summary of the article "Why You Are At Risk Of Phishing Attacks" by Joseph Steinberg.

  The relationship between a young man and his church

Read Hughes' "Salvation" and Lorde's "The Fourth of July."  Both are short "coming of age" stories about young African Americans.  However, the similarities end there.  Hughes focuses on the relationship between a young man and his church communit..

  Write response about essay respond to advertisements r us

Write a one page journal response about the essay "Respond to Advertisements R US" by Melissa Rubin.

  Write paper on large round of layoffs expected at microsoft

Write a paper about the article "Large Round of Layoffs Expected at Microsoft" by NICK WINGFIELD.

  What techniques or processes are used to create the

write the individual project 3-4 pages not including references. using the terminology and concepts that you are

  Explain the insidious plan

Explain "the insidious plan" that Faber and Montag discuss: "To see the firehouses burn across the land,destroyed as hotbeds of treason"

  Explains key points of differences in learning styles

Write a paper that explains the key points of the following articles- Differences in Learning Styles and Preconditions of Young Learners' Humanistic Education During Physical Education Lessons.

  Write a paper on the analysis of emersons self-reliance

Write a paper on the Analysis of Emerson ‘s self-reliance, The appeal to Religious experience in Edwards and Comparison of the value of reading in Emerson and Thoreau.

  Write summary of the climate crisis at the end of our fork

Write a two pages summary that has few qautations of this artical called "The Climate Crisis at the End of Our Fork."

  Decribe how poem functions as a reflection of restoration

Decribe how the poem functions as a reflection of restoration and eighteenth century mannerisms. Integrate the literary concept of "mock heroic" in your answer. In Lady Wortley Montagu's assessment of Swift's "The Lady's Dressing Room," page 1262, sh..

  Different aspects are these two societies similar

Although the dystopia in Fahrenheit 451 is fictional, in many ways it parallels (is very similar to), perhaps to a lesser extent, some societies today.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd