answer the following questions
- submit as single MS Word file under Assignments)
- Part 1 (Refer to thew sources bellow)
- After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level.
- Utilize additional resources as needed.
- Conclude with a research or policy question for further research.
- You must utilize literature and cite properly.
- Use APA style.
- Provide in-text citations and references.
- Part 1 (Refer to thew sources bellow)
- Required: Deloitte-NASCIO (2013). Cybersecurity Study State Governments at Risk: A Call for Collaboration and Compliance.
- Required: Moore at al. (2010). Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Santa Monica, CA: RAND (Chapters 4 & 5)
- Required: Marcus, L. J., Dorn, B. C. & Henderson, J.M. (2005). Meta-leadership and national emergency preparedness strategies to build government connectivity. Working Paper, Center for Public Leadership, Harvard University.
- Required: Becerra-Fernandez, I., Madey, G., Prietula, M., Rodriguez, D., Valerdi, R., & Wright, T. (2008). Design and Development of a Virtual Emergency Operations Center for Disaster Management Research, Training, and Discovery. Paper presented at the Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences.
- Required:Becerra-Fernandez, I., Xia, W., Gudi, A., & Rocha, J. (2007). Task Characteristics, Knowledge Sharing and Integration, and Emergency Management Performance: Research Agenda and Emergency Management Challenges. Paper presented at the 16th International Conference on Management of Technology.
- Recommended: Goodyear, M., Portillo, S., Goerdel, H. T., Williams, L. (2010). Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers. IBM Center for the Business of Government.
- Recommended: Bhavanishankar, R., Subramanian, C., Kumar, M., & Dugar, D. (2009). A context aware approach to emergency management systems. Paper presented at the Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly.
- Part 2 (Refer to sources bellow)
- After reading the article, respond to the following fourquestions bellow.
- Separate each response with the sub-headed question statement):
- Larry Clinton describes government-industry partnership as similar to a parent-child relationship, wherein the parent (government) feels the need to exhibit some tough love on an uncooperative and immature child (the private sector). The analogy breaks down, however, when one realizes that in this case the “child” (industry) is actually far bigger, stronger, and has more resources than the supposed parent. Clinton argues it is the parent (government) in this case that is ultimately reliant on the child for cyber security. While industry cyber systems are vulnerable to attack-as are virtually all infrastructures historically- the market has produced an array of effective means to protect their cyber systems. The problem is the lack of proper implementation of cyber security best practices and relatively simple fixes, like software updates and security patches. Title each response with the question text:
- What needs to be done and how do we get people to do it?
- Will a traditional regulatory model work in this space?
- Does a newer model to address uniquely 21st century issues need to be developed?
- Whom should the government regulate?
- Conclude with a research or policy question for further research.
- You must utilize literature and cite properly.
- Use APA style
- Provide in-text citations and references.
- Required: Clinton, L (2011). Industry- Government Partnership for Cyber Defense, Journal of Strategic Security, Volume 4, Number 2 , Summer 2011 (it may take 5-6 minutes to download
- Required: National Research Council Group (2010). Read sections “Attribution and Economics,” (pp. 3-54) and “The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence,” (pp. 245-272) in Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks. Proceedings of a Workshop on Deterring Cyber Attacks (takes a couple of minutes to download).
- Required: Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009 March 31, 2009.
Submit both Parts as a single Microsoft Word document
Solution Preview
Cyber security management
Introduction
Cyber security involves a collection of technologies as well as practices designed to protect systems and computer from risky attack, misuse or unauthorized access. Cyber security, is also known as information technology security. It aims at protecting computers, programs and information resources from unwanted or unauthorized access, alteration or destruction. The emergence of the new chief information security manager role has streamlined the process of cyber security in many organizations and institutions (Goodyear & Goerdel, 2010).
(1,456 words)