What attribution and why it so important to cyber security


Assignment: CYBER SECURITY FOR ENGINEERING MANAGERS

Instructions

Answer one question from Part A, three questions from Part B, and one question from Part C. The test is open book and open notes, but no collaboration is allowed. Length is about 300 to 500 words for each answer, about 1,500 to 2500 words overall. While the syllabus specifies "hand-written", students are allowed to complete their work in WORD or another equivalent word-processing software.

All answers should demonstrate awareness of the definitions, actors, issues, and events covered in class. "A" quality answers will provide support using examples and citations from course readings. Footnotes for examples and citations are not required but should be highlighted for source acknowledgement.

PART A - Fundamental Definitions (Answer one question)

1. Define and describe Cyber War. How does it differ from traditional warfare? How is it the same? Why does it matter?

2. Is cyberspace a part of the global commons? Does the traditional concept of sovereignty apply to cyber? Why or why not?

3. Define and describe "restraint dynamics". Are these dynamics in play in cyber-crime, cyber-espionage, and cyber-terrorism? Why or why not?

PART B - Cyber Issues (Answer three questions)

1. How is cyber-deterrence different from nuclear or major conventional attack deterrence? Which of the forms of cyber event (i.e. espionage, terrorism, crime, conflict) is cyber-deterrence best able to control? Why?

2. Does the government or the private sector have the greater responsibility for ensuring cyber security? Does it matter what region we are considering in answering this question? Discuss ways both might manage those responsibilities.

3. Select one of the following events and discuss a) what happened; b) what did we learn after that event that changed our understanding or response to cyber?

a. Shamoon b. Estonia

4. Discuss cyber threats from the nations in group a or b below and the impact of those threats internationally.

a. North Korea b. Russia

5. What is attribution and why is it so important to cyber security? What makes it so difficult?

PART C - Readings and Research (Answer one question)

1. In Cyber Spies the author, Gordon Corera, discusses Chinese cyber espionage and the benefits they have gained from that espionage. Who has the primary responsibility for protecting organizations and individuals from such espionage, governments, organizations, or individuals? Why? Should countries like China conducting espionage be liable for their actions? What makes this difficult?

2. When considering internet emergence and expansion in developing regions like Africa, what are the top three cybersecurity concerns that should be considered? How are these three concerns affecting economic development in African countries? What primary steps (top three) should governments or regional / international organizations take to protect, mitigate, and prevent these concerns from holding back developing African economies?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What attribution and why it so important to cyber security
Reference No:- TGS02987697

Now Priced at $60 (50% Discount)

Recommended (95%)

Rated (4.7/5)