respond to the following
- submit as single MS Word file
-
- After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level.
- Utilize additional resources as needed.
- Conclude with a research or policy question for further research.
- You must utilize literature and cite properly.
- Use APA style.
- Provide in-text citations and references.
-
- Part 2
- After reading the article, respond to the following four questions bellow.
- Separate each response with the sub-headed question statement):
- Larry Clinton describes government-industry partnership as similar to a parent-child relationship, wherein the parent (government) feels the need to exhibit some tough love on an uncooperative and immature child (the private sector). The analogy breaks down, however, when one realizes that in this case the “child” (industry) is actually far bigger, stronger, and has more resources than the supposed parent. Clinton argues it is the parent (government) in this case that is ultimately reliant on the child for cyber security. While industry cyber systems are vulnerable to attack-as are virtually all infrastructures historically- the market has produced an array of effective means to protect their cyber systems. The problem is the lack of proper implementation of cyber security best practices and relatively simple fixes, like software updates and security patches. Title each response with the question text:
- What needs to be done and how do we get people to do it?
- Will a traditional regulatory model work in this space?
- Does a newer model to address uniquely 21st century issues need to be developed?
- Whom should the government regulate?
- Conclude with a research or policy question for further research.
- You must utilize literature and cite properly.
- Use APA style
- Provide in-text citations and references.
part 2 references
- Required: Clinton, L (2011). Industry- Government Partnership for Cyber Defense, Journal of Strategic Security, Volume 4, Number 2 , Summer 2011
- Required: National Research Council Group (2010). Read sections “Attribution and Economics,” (pp. 3-54) and “The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence,” (pp. 245-272) in Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks. Proceedings of a Workshop on Deterring Cyber Attacks (takes a couple of minutes to download).
- Required: Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009 March 31, 2009.
20190427165800iscram2008_becerra_fernandez_etal
2019042716575210045_ibm_goodyear_v6a
201904271657382012_nascio_deloitte_global
Solution Preview
Abstract
Cybersecurity remains to be among the top-notch issues affecting the state Chief information Officers labeled as CIOs as well as the Chief Information Security Officers abbreviated as CISOs in the current world. The threats of security and the secrets across the states have been firmly identified. Nevertheless, the nature of this security and secrecy game has increasingly changed. The hackers along with other cybercriminals are a modern breed of the threat to secrecy with a social and political agenda. These individuals apply progressively complicated strategies incorporating a fast-evolving technology to aim the infrastructures of cyber for self-financial gain while making political statements. As the country focuses on the future of the applications hosted by the internet applying the contemporary technologies, such as vast data, cloud computing, mobile solutions while continually developing their electronic repositories of treasured citizen data, addressing the problem of protecting individual identifiable data and systems of the state is of most considerable prominence.
(2,720 words)