Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 6 Days Ago |
Questions Answered: | 7559 |
Tutorials Posted: | 7341 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
Team Assignment 2:Â Human Factors and Cyber PolicyÂ
Course Objective: Â Critically assess the intellectual property and digital rights management and other legal issues that exist in cyberspace. Apply concepts covered throughout the 12-week cybersecurity policy course. Design effective organizational cybersecurity standards and policies.
Competencies:Â Critical thinking, team-building skills, communication skills
Directions:Â
Incorporating concepts from the entire semester, each team prepares an abbreviated report including recommended cybersecurity policy for the organization described in the Week 6 Interactive Case Study. The report and policy recommendations should not focus on technology controls but should instead emphasize the human factors related to cybersecurity policy. Teams will apply the cultural, psychological and social concepts presented in the course. Throughout the semester we have studied how human factors can influence policy choices for domestic and international cybersecurity issues.Â
Some of the Human Factors we have studied:
Each team will select FOUR cybersecurity topics from the list provided below, and will research the influence of Human Factors on recommended cybersecurity policy controls.Â
Â
Writing Assignment:Â Choose (4) from the Topics List near the bottom of these instructions, then answer these questions: Â
Â
Discussion for each topic should include --
A. The topic name and important security issues (vulnerability issues, or mission goals/conflicts issues, or legal/liability issues),
B. Recommended policy controls, and
C. How or why human factors can influence the effectiveness of each recommended policy control.
Â
Hint: Â To improve chances for a higher score, construct an outline of the questions asked before starting any research or writing. Â The outline is not submitted, but it should be used to help create the TOC. Â The Introduction should demonstrate that a careful outline was done before writing, and the introduction should also preview the content of the research paper.Â
Â
Choose FOUR topics from the list below.Â
Topics List:Â Â
1.    Zero Day Exploits employed for economic or military advantage (five pages on this topic ONLY)
2.    Cyber Crime, Cyber Terrorism and threats to SCADA systems
3.    Private sector businesses compliance with government IT security regulations to protect national security
4.    Meta-Data collected and used by the Private sector and Public sector
5.    Vulnerability assessments for Mobile Devices in the BYOD environment
6.    Threats to copyright and ownership of intellectual property
Â
Â
RubicÂ
Criteria |
Excellent A (90+) |
Satisfactory B (80-89) |
Needs Improvement (below 80) |
Team work plan (10%) |
The team agreement and the work plan for the team assignment are thorough and complete. Â |
The team agreement and the work plan for the team assignment are complete. |
The team agreement and the work plan for the team assignment are not complete. |
Identify security issues for each topic and make policy controls recommendations (25%) |
Report and policy recommendations are thoroughly developed, clearly reasoned, and logically presented. Four topics include and expanded and extensive discussion of vulnerability issues, or mission goals and conflicts, or legal and liability issues. Policy controls are recommended to manage the issues. Â |
Report and policy recommendations are sufficiently developed and logically presented. |
Report and policy are not sufficiently developed and/or logically presented. |
Human Factors are linked to effectiveness of policy controls (20%) |
An expansive number of Human Factors are clearly described and linked to security issues and designated policy controls. The strong or weak, and positive or negative influences of Human Factors on cyber policy are clearly explained or successfully argued. Â Â |
A moderate number of Human Factors are described, but not clearly linked to controls. Â Influences are not clearly explained. |
Human Factors are not sufficiently described. Â Influences are not clearly explained. |
Apply topics covered in this course (25%) |
Report  demonstrates extensive application of concepts for human aspects of cybersecurity, ethics, cybercrime, privacy, and other topics covered in the twelve weeks of this course. Team demonstrates mastery of course content.  |
Report and policy demonstrate adequate application of topics covered in this course. Team demonstrates comprehension of course topics. |
Report and policy do not demonstrate adequate application of topics covered in this course. Team does not demonstrate comprehension of course topics. |
Organization (10%) |
The Table of Contents (TOC) and the document sub-headings reflect a careful outline of the questions asked in the assignment. The content is well organized, with content clearly linked to the TOC, and with clear transitions among major subtopics.  |
The content is generally well organized with some improvement possible in transition among subtopics. |
The organization of the content is confusing without clear transitions among subtopics. |
Writing Style (5%)                      |
The introduction is written to give a preview of each sub-heading topic. Graduate-level writing is reflected throughout the assignment including accurate spelling, punctuation, grammar, and sentence structure. Â |
Writing is acceptable, with few errors in spelling, punctuation, grammar, and sentence structure. |
Writing does not meet graduate standards.  Unacceptable number of errors in spelling, punctuation, grammar, and/or sentence structure. |
Use of Proper APA Â Formatting (5%) |
In-text citations are in proper APA format and all sources are identified in the reference list and cited in proper APA format. Â |
Minor errors in APA formatting of citations and references. |
Unacceptable number of errors in APA formatting of citations and references. |
-----------