Project #161876 - Cyber Policy and Goals

Computer Tutors

Subject Computer
Due By (Pacific Time) 01/14/2017 12:00 am

Required Reading

Federal Emergency Management Agency (FEMA ) (2012, Mar 7). Cyber Incident Annex. Retrieved from: https://www.fema.gov/media-library/assets/documents/25556 

Fischer, E. A. (2014, Dec 12), Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation. Congressional Research Service.  Retrieved from: http://www.higheredcompliance.org/resources/CRS-RPT_R42114_2014-12-12.pdf

Kurtz, P. (2015, May 19). Congress Wants Companies Facing Cyberattacks to Share Data, and It’s Not a Moment Too Soon.  Retrieved from: http://qz.com/407215/congress-wants-companies-facing-cyber-attacks-to-share-data-and-its-not-a-moment-too-soon/

National Institute of Standards and Technology (2001). NIST Special Publication 800-33 - Underlying Technical Models for Information Technology Security.  Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-33/sp800-33.pdf

Richards H. W. (2015, Oct 5). Congressional action on cybersecurity would send strong message to China, Congress Blog.  Retrieved from: http://thehill.com/blogs/congress-blog/technology/255716-congressional-action-on-cybersecurity-would-send-strong

Required Websites

Department of Homeland Security (DHS). National Cybersecurity and Communications Integration Center. Retrieved from: http://www.dhs.gov/national-cybersecurity-communications-integration-center

Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from: http://www.dhs.gov/national-infrastructure-protection-plan

Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from: http://www.dhs.gov/critical-infrastructure-sectors

Case

Studies have revealed that many businesses and organizations are not prepared for a cyber-attack.  Analysts refer to cyber as a general cat and mouse game, where once cyber defenses are in place in response to the threat, new threats arise.  Having a strong cybersecurity program is important in mitigating these threats.  This includes having a strong information security program that provides a full spectrum of services that addresses all aspects of cyber defense. 

For this Case, answer the following:

  1. Explain the goals for information security (availability, integrity, confidentiality, accountability, and assurance).
  2. Discuss the categories of services (supporting, prevention, and detection and recovery) needed to achieve these goals.

Assignment Expectations

Assignments should be 3-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

  • Relevance—All content is connected to the question.
  • Precision—Specific question is addressed. Statements, facts, and statistics are specific and accurate.
  • Depth of discussion—Present and integrate points that lead to deeper issues.
  • Breadth—Multiple perspectives and references, multiple issues/factors considered.
  • Evidence—Points are well-supported with facts, statistics and references.
  • Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
  • Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
  • Objectivity—Avoids use of first person and subjective bias.
  • References—Sources are listed at the end of the paper.

Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).

TutorRating
pallavi

out of 1971 reviews
amosmm

out of 766 reviews
PhyzKyd

out of 1164 reviews
rajdeep77

out of 721 reviews
sctys

out of 1600 reviews
sharadgreen

out of 770 reviews
topnotcher

out of 766 reviews
XXXIAO

out of 680 reviews