Project #161877 - Cyber Policy and Goals

Computer Tutors

Subject Computer
Due By (Pacific Time) 01/14/2017 12:00 am

Required Reading

Federal Emergency Management Agency (FEMA ) (2012, Mar 7). Cyber Incident Annex. Retrieved from: https://www.fema.gov/media-library/assets/documents/25556 

Fischer, E. A. (2014, Dec 12), Federal Laws Relating to Cybersecurity: Overview of Major Issues, Current Laws, and Proposed Legislation. Congressional Research Service.  Retrieved from: http://www.higheredcompliance.org/resources/CRS-RPT_R42114_2014-12-12.pdf

Kurtz, P. (2015, May 19). Congress Wants Companies Facing Cyberattacks to Share Data, and It’s Not a Moment Too Soon.  Retrieved from: http://qz.com/407215/congress-wants-companies-facing-cyber-attacks-to-share-data-and-its-not-a-moment-too-soon/

National Institute of Standards and Technology (2001). NIST Special Publication 800-33 - Underlying Technical Models for Information Technology Security.  Retrieved from: http://csrc.nist.gov/publications/nistpubs/800-33/sp800-33.pdf

Richards H. W. (2015, Oct 5). Congressional action on cybersecurity would send strong message to China, Congress Blog.  Retrieved from: http://thehill.com/blogs/congress-blog/technology/255716-congressional-action-on-cybersecurity-would-send-strong

Required Websites

Department of Homeland Security (DHS). National Cybersecurity and Communications Integration Center. Retrieved from: http://www.dhs.gov/national-cybersecurity-communications-integration-center

Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from: http://www.dhs.gov/national-infrastructure-protection-plan

Department of Homeland Security (DHS). Critical Infrastructure Sectors. Retrieved from: http://www.dhs.gov/critical-infrastructure-sectors

TutorRating
pallavi

out of 1971 reviews
amosmm

out of 766 reviews
PhyzKyd

out of 1164 reviews
rajdeep77

out of 721 reviews
sctys

out of 1600 reviews
sharadgreen

out of 770 reviews
topnotcher

out of 766 reviews
XXXIAO

out of 680 reviews