HLS571 Session Long Project
Style | APA |
Number of words | 1235 |
Number of sources | 0 |
Spacing | Double |
PowerPoint slides | 0 |
Question
I’m stuck on a Law question and need an explanation.
Module 2 – SLP
CYBER POLICY AND GOALS
With both public and private assets at risk, national policies are helping to promote frameworks to combat cyber threats. The policies and framework include legislation and public/private cooperation to form groups and centers to assess these threats.
For this SLP, answer the following:
1.Discuss the top national policies for combating cyber-crimes.
2.What are the primary agencies that are responsible in preparing for, responding, and recovering from a cyber-attack?
3.Go to National Cyber Strategy. Find references to Law Enforcement and explain the growing role of law enforcement in the new cyber strategy of the United States.
SLP Assignment Expectations
Assignments should be 4–5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.
Relevance—All content is connected to the question.
Depth of discussion—Present and integrate points that lead to deeper issues.
Breadth—Multiple perspectives and references, multiple issues/factors considered.
Evidence—Points are well-supported with facts, statistics and references.
Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
Clarity—Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity—Avoids use of first-person and subjective bias.
References—Sources are listed at the end of the paper.
Use strong credible sources—peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).
____________________________________________________________________________________________________
Module 2 – Background
CYBER POLICY AND GOALS
REQUIRED READING
Cybersecurity legislation 2018. (2018). National Conference of State Legislatures. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/cybersecurity-legislation-2018.aspx Read the short Introduction and scroll down to your state to see cybersecurity legislation.
Metivier, B. (2017). Fundamental objectives of information security: The CIA triad. Sage Data Security. Retrieved from https://www.sagedatasecurity.com/blog/fundamental-objectives-of-information-security-the-cia-triad
Moghaddasi, H., Sajjadi, S., & Kamkarhaghighi, M. (2016). Reasons in support of data security and data security management as two independent concepts: A new model. The Open Medical Informatics Journal, 10. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5090776/
National Cyber Strategy of the United States of America. (September 2018). The White House. Retrieved from https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
REQUIRED WEBSITES
Cyber Threat Intelligence Integration Center. Office of the Director of National Intelligence. https://www.dni.gov/index.php/ctiic-home
Department of Homeland Security (DHS). National Cybersecurity and Communications Integration Center. Retrieved from https://us-cert.cisa.gov/nccic
Department of Homeland Security (DHS). National Infrastructure Protection Plan. Retrieved from http://www.dhs.gov/national-infrastructure-protection-plan
NIST Cybersecurity Framework. https://www.nist.gov/cyberframework/online-learning/five-functions
Requirements: Instructions provided above and on attachment.
20210228191232hls571__background2 (1)