Fill This Form To Receive Instant Help
Homework answers / question archive / CSEC 670 CYBERSECURITY THERE ARE 4 TOPICS IN EACH CONFERENCE
CSEC 670 CYBERSECURITY
THERE ARE 4 TOPICS IN EACH CONFERENCE. EACH TOPIC MUST BE A FULL ONE PAGE PAPER WITH 2 REFERENCES EACH. SEPARATE THE TOPICS WITH COVER PAGE. AT THE END OF EACH TOPIC YOU MUST HAVE 2 ACADEMIC REFERENCES. THE WRITINGS MUST BE ORIGINAL PLEASE AS IT WILL BE CHECKED FOR PLAGIARISM
Conference 1
Topic 1 - The Internet: Revolutionary Change?
Changes to business enterprises in response to the commercialization and growth of the Internet are often seen as by-products of revolutionary change.
A. Why is the Internet viewed as a revolutionary change?
B. Describe some of the attributes of revolutionary change brought about by the Internet and their impacts on security.
You are encouraged to include real examples from your past studies that you can share with your fellow students.
Topic 2 – What is Cybersecurity?
Revolutionary change often creates a paradigm shift. Given a new paradigm, it would be beneficial to redraw the cybersecurity landscape, critically assessing how the problem of cybersecurity should be defined.
What exactly is cybersecurity? Is it a function or task? Is it a strategy? Is it about crime? Is it about national security?
This week we are reviewing responses to an asymmetric threat.
A. What is an asymmetric threat?
B. Describe some dynamic approaches for defending against an asymmetric threat
Topic 4 - Westphalian Model Advantages at Global Level
Not only must asymmetric advantages be countered domestically, attackers often originate from outside the United States. Given that situation, describe how the Westphalian model would aid cybersecurity at the global level.
Conference 2
Topic 1 – Advanced Persistent Threats
A. What Are Advanced Persistent Threats (APTs)?
B. How do they impact cybersecurity?
C. Describe three Policies and Procedures to Mitigate APTs which you would recommend for organizations.
Topic 2 – Emerging Cybersecurity Vulnerabilities
Emerging vulnerable areas for cybersecurity include; Social Networks, mobility, remote hostile takeovers, and the Smart grid. Select one vulnerable area and review threats and effective management policies to counter the risks within that area.
Topic 3 – Mitigating Global Cybersecurity Attacks on the Enterprise
The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity. We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level?
Topic 4 – Vulnerability Assessments
A. What is the purpose of a vulnerability assessment?
B. Describe the key steps and common elements of vulnerability assessments and how often these assessments should take place.
Conference Paper 3
Topic 1 – Management Actions Prior to Cyber Attack
After a cyber attack, the organizational decision making and response to the attack is critical to getting the organization through the incident and back to normal business after the attack. Please review and discuss the actions management should take prior to a cyber attack. Include in your discussion an overview of crisis management and the role it plays in recovery.
Topic 2: Business Continuity Plans
Business continuity plans (BCP) describe processes and procedures that an organization activates for any threat or issue that may prevent the organization from carrying on normal business. Examples include cybersecurity attacks, fire, flood, and other business disruption causes. Describe and discuss the main components of a BCP.
Topic 3 - Offensive Cyber Attack Technology
In traditional warfare, attacking communications and command and control functions are integral to victory. Attacking the systems that are the conduit of those critical functions are equally integral to victory. Discuss three offensive cyber attack technologies and when they should be deployed.
Topic 4 - Building a Coordinated Federal Cyber Strategy
Within the US Government, no single department or agency has the ultimate responsibility for securing or responding against cyber attacks. Discuss an approach to building a coordination and collaboration comprehensive strategy across the federal government to reduce cyber security attacks.