Assignment 1: Cybersecurity laws, regulations, and legal concepts
5 PAGES IN LENGTH
Course Objective: Research cybersecurity laws, regulations and legal concepts, and relate them to managerial decisions needed to protect national security.
Each student explores cybersecurity as a public good.
Answer these questions:
1. How should government justify telling private industry how to set up or improve their cybersecurity?
• Keeping the focus on national security concerns, clearly discuss the compelling sociopolitical reasons, motivations, or arguments for or against government intervention into private sector cybersecurity.
• Clearly discuss the methods of government intervention. That is, what authorities (such as specific laws, regulations and rules) give the executive or legislative representatives the right to regulate private industry?I highly recommend that you use the LEXIS/NEXIS database and peruse some law review journals in your quest to answer and discuss this question. 🙂
• Describe real-world examples that help support your discussion.
2. Clearly discuss the impacts/effects, if any, on national security due to government regulation required to be implemented by private industry.
• Clearly discuss effects on national security that might result from (a) failure to comply with related cyber regulations or requirements, (b) meeting only the minimum requirements, and (c) exceeding the minimum requirements.
• Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.
• Describe real-world examples that help support your discussion.
Hint: First prepare an outline based on the questions asked in this assignment. The outline is not submitted as part of the final report, but it should be used to help structure your TOC. Also, the introduction should provide a brief preview for the reader, indicating what areas your research explored. Do this for all your research papers, both the individual and the team projects.
Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.
The paper must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.
Assignment 2: Goals of Private Businesses and Lawmakers—5 PAGES IN LENGTH
Course Objectives: Develop Skills to design effective organization cybersecurity standards and policies.
Private Sector-Public Sector cybersecurity issues
Some observers say industry compliance with government regulations to improve cybersecurity is necessary to protect consumers and guard economic progress. Others state that regulation is a drag on industry, and actually reduces productivity.
Answer the following questions — you may use the links provided below to begin your research, but you must find new, additional, citations to supplement these to show that you did extra research. You may also want to refer back to discussions and assignments in the previous weeks.
Focus on the goals of private businesses, and the goals of lawmakers for economic progress and economic security –
1. Focusing on the goals of private businesses, and the goals of lawmakers for economic progress and economic security, select one example private-sector industry, describe the general business goals by using information on the web sites of one or two business within this industry, and explain why meta-data about customers and consumers is important to businesses within this industry. (here, meta-data means Big-Data collected about consumers to determine customer habits).
2. Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer. Use citations to support your arguments about how some action or result related to collection of meta-data may be harmful to customers.
3. What possible activities should lawmakers consider regulating to control the way that this example industry gathers and uses meta-data?
4. What are the goals of lawmakers in the public sector — or why should lawmakers even think regulating these possible industry activities is useful?
5. What might happen to the goals of this industry, and to the public sector goals, as more new cybersecurity regulations are put in place for business compliance?
Background: Possible effects on innovation due to cybersecurity government regulations —
1. Tech Companies Warn Privacy Rules Will Kill Innovation [2012]
2. Hospitals say Device Manufacturers Resist Boosting Cybersecurity < http://www.ihealthbeat.org/articles/2013/8/7/hospitals-say-device-manufacturers-resist-boosting-cybersecurity
3. U.S. Chamber Leads Defeat of Cybersecurity Bill [2012]
Prepare your paper in Word format and in accordance with APA 6th edition guidelines.
The paper must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count starts with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.
Assignment 3: 5 PAGES IN LENGTH
Individual Assignment #3 Instructions: Hacker Culture and Mitigation
Course Objective: Examine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user’s perspectives.
Competencies: Critical thinking, communication skills
Each student may choose one of the following organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past incident in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets against disruption, and describe motivations of any possible third-parties that may also have been involved. The student will also suggest methods for the organization to discourage hackers or intruders with similar motives and suggest management, policy or technology controls to protect the organization against similar attacks.
Organizations, Attacks, and Perpetrators:
Home Depot
Target
Sony
Office of Personnel Management
Saudi Aramco
Turbo Tax
NASA
Operation Aurora
US Bureau of Justice Statistics
Stuxnet and Flame (US Government?)
Dupont Chemical
Boeing
Johnson & Johnson
Pfizer
4Chan
Tricare Medical
Opi Israel
Sony
News of the World
Motorola
Omega Engineering
Syrian Electronic Army
Njrat
The Jester
Blue Army
Project Chanology
The Estonian Cyberwar
Shamoon (Iran?)
Your paper should describe the type of incident and the actors: personalities, motivations, and other contributing cultural or psychological characteristics. You will find Module “Psychological Aspects of Cybersecurity” helpful with this assignment. Link your analysis to previous readings, interactive modules, and discussion topics, with appropriate citations.
At a minimum, the questions you must address are listed below:
a. What descriptive labels might apply to this type of threat/incident?
b. Regarding the threat actors:
What sort of people would go after this information?
Why would they want it?
What will/can they do with it?
How would they get it?
How would potential attackers be identified?
c. How would the organization try to discourage, or reduce the incentives that could attract possible threat actors?
d. How would the organization protect against, or reduce damaging effects due to attempted attacks?
Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.
Assignment 4: 5 PAGES IN LENGTH
Individual Assignment #4: New Privacy Issues Related to Cyberspace
Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios.
Competencies: Critical thinking, communication skills
Select three organizations within the same industry for analysis —
1. Students should pick one industry from the displayed list below, and within that single industry, name 3 organizations for analysis.
2. Describe the mission of each (from their website), and examine and compare details of each stated privacy policy, then
3. For each organization, recommend policy changes that will enable each organization to (a) use sensitive customer information to increase business advantage and profitability, and (b) also protect customer personal information to avoid possible privacy or liability issues.
You may need to use trade journals and newspaper stories in your reference list. However, try to avoid opinion pieces (like blogs) that may not be factual. You may state your own opinions, but these must be strengthened by scholarly references.
Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.
Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.
Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It might take several hours to a day or two for Turnitin.com to do this. After your paper meets all of the stated criteria in the posting, attach the paper AND the originality report in your Assignments Folder by the end of Week 10: Sunday, 11:59 p.m. eastern time.
Industry Organizations
Social Media LinkedIn, Google+, Facebook, Twitter
Mobile Phone Verizon Wireless, Cricket, AT&T Wireless, Metro PCS
Antivirus Software AntiVirusGrisoft, Norton, McAfee, Microsoft, Kaspersky, Avast
eCommerce eBay, Amazon, Craigslist, TigerDirect
Telecommunications AT&T, Verizon, Sprint
Big Box Walmart, Target, Costco, Sears
Streaming Media Netflix, Blockbuster, Walmart (VUDU), Xbox
Search Engines Google, Yahoo, Bing
Insurance Companies Farmers Insurance Group, Monumental Life Insurance, Metropolitan Life Insurance
Fast Food McDonald’s, Wendy’s, Burger King
Online Higher Education Drexel University Online, University of Maryland University College, Penn State World Campus, Coursera
Media The Washington Post, The New York Times, CBS News, ESPN.com
Banks Bank of America, JP Morgan Chase, Citigroup, Wells Fargo, SunTrust, a credit union
Job Search Sites USAjobs.gov, Monster.com, Indeed.com, Careerbuilder.com, Simplyhired.com
Grocery Stores Safeway, Giant, Whole Foods, Kroger

+1 862 207 3288 