respond to the following

respond to the following

  • submit as single MS Word file
      • After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level.
      • Utilize additional resources as needed.
      • Conclude with a research or policy question for further research.
      • You must utilize literature and cite properly.
      • Use APA style.
      • Provide in-text citations and references.
  • Part 2
    • After reading the article, respond to the following four questions bellow.
    • Separate each response with the sub-headed question statement):
      • Larry Clinton describes government-industry partnership as similar to a parent-child relationship, wherein the parent (government) feels the need to exhibit some tough love on an uncooperative and immature child (the private sector). The analogy breaks down, however, when one realizes that in this case the “child” (industry) is actually far bigger, stronger, and has more resources than the supposed parent. Clinton argues it is the parent (government) in this case that is ultimately reliant on the child for cyber security. While industry cyber systems are vulnerable to attack-as are virtually all infrastructures historically- the market has produced an array of effective means to protect their cyber systems. The problem is the lack of proper implementation of cyber security best practices and relatively simple fixes, like software updates and security patches. Title each response with the question text:
    • What needs to be done and how do we get people to do it?
    • Will a traditional regulatory model work in this space?
    • Does a newer model to address uniquely 21st century issues need to be developed?
    • Whom should the government regulate?
    • Conclude with a research or policy question for further research.
    • You must utilize literature and cite properly.
    • Use APA style
    • Provide in-text citations and references.

part 2 references

 

20190427165800iscram2008_becerra_fernandez_etal

2019042716575210045_ibm_goodyear_v6a

201904271657382012_nascio_deloitte_global

20190427165830rand_tr764

 

Solution Preview

Abstract

       Cybersecurity remains to be among the top-notch issues affecting the state Chief information Officers labeled as CIOs as well as the Chief Information Security Officers abbreviated as CISOs in the current world. The threats of security and the secrets across the states have been firmly identified. Nevertheless, the nature of this security and secrecy game has increasingly changed. The hackers along with other cybercriminals are a modern breed of the threat to secrecy with a social and political agenda. These individuals apply progressively complicated strategies incorporating a fast-evolving technology to aim the infrastructures of cyber for self-financial gain while making political statements. As the country focuses on the future of the applications hosted by the internet applying the contemporary technologies, such as vast data, cloud computing, mobile solutions while continually developing their electronic repositories of treasured citizen data, addressing the problem of protecting individual identifiable data and systems of the state is of most considerable prominence.

(2,720 words)

Open chat
Hello
Contact us here via WhatsApp