Course Objective:
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Assess cybersecurity technologies and policies that can effectively counter cyber attacks at the enterprise, national, and international levels. Where appropriate highlight cybersecurity laws, regulations and legal concepts.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Competencies:
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Systems Thinking, Information Literacy/Research Skills
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Problem Solving
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Ethical Leadership
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Individual Assignment #1
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Write an 18 page (approximately 5500 words) policy paper in which you assess emerging cyber security approaches and technologies and government efforts to nurture them. Your paper must include: Cover Page, Table of Contents, Introduction, Section Headings and Subheadings, Conclusions, in-text citations and list of References, and page numbers. The paper must be formatted according to the mandatory paper format guidelines. The page count begins with the Introduction and ends with the Conclusions and does not include any figures or tables. Prepare your paper in Word (.doc or .docx). Include a minimum of 8 credible, external sources. At least 75% of references should be based on official reports, scholarly studies, or peer-reviewed journal articles. The latest edition of Strunk& White is the authoritative reference for grammar questions for the assignment.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
1.How do these emerging cybersecurity technologies and prioritized research and development improve cybersecurity?
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
A. Clearly define these emerging technologies and their main features.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
B. Clearly define how an organization would use these technologies.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
C. Describe real-world examples of the use of these technologies.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
2.Discuss the role of the federal government in the support and nurturing of these cyber security technologies.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
A. Clearly discuss what benefits or drawbacks government efforts to support new cybersecurity technologies may create.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
B. Describe real-world examples that help support your position.
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>
Roman","serif"; font-size: 12.0pt; mso-fareast-font-family: "Times New Roman";”>