SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 6 Days Ago
Questions Answered: 7559
Tutorials Posted: 7341

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Information Systems Posted 19 Apr 2017 My Price 10.00

Vulnerability Assessments for Mobile Devices in the BYOD Environment

Team Assignment 2:  Human Factors and Cyber Policy 

Course Objective:  Critically assess the intellectual property and digital rights management and other legal issues that exist in cyberspace. Apply concepts covered throughout the 12-week cybersecurity policy course. Design effective organizational cybersecurity standards and policies.

Competencies: Critical thinking, team-building skills, communication skills

Directions: 

Incorporating concepts from the entire semester, each team prepares an abbreviated report including recommended cybersecurity policy for the organization described in the Week 6 Interactive Case Study. The report and policy recommendations should not focus on technology controls but should instead emphasize the human factors related to cybersecurity policy. Teams will apply the cultural, psychological and social concepts presented in the course. Throughout the semester we have studied how human factors can influence policy choices for domestic and international cybersecurity issues. 

Some of the Human Factors we have studied:

  1. Ethics and Culture -- Weeks 3, 4,8    
  2. Psychological Motivations -- Weeks 5, 6, 7
  3. Anonymity --- Weeks 9, 11     

Each team will select FOUR cybersecurity topics from the list provided below, and will research the influence of Human Factors on recommended cybersecurity policy controls. 

 

Writing Assignment:  Choose (4) from the Topics List near the bottom of these instructions, then answer these questions:  

  • What are the major cybersecurity issues related to each of the 4 topics chosen?
  • What policy controls would your team recommend to help manage each of the 4 cybersecurity issues?  
  • Discuss how Human Factors influence the effectiveness of these recommended policy controls.

 

Discussion for each topic should include --

A. The topic name and important security issues (vulnerability issues, or mission goals/conflicts issues, or legal/liability issues),

B. Recommended policy controls, and

C. How or why human factors can influence the effectiveness of each recommended policy control.

 

Hint:  To improve chances for a higher score, construct an outline of the questions asked before starting any research or writing.  The outline is not submitted, but it should be used to help create the TOC.  The Introduction should demonstrate that a careful outline was done before writing, and the introduction should also preview the content of the research paper. 

 

Choose FOUR topics from the list below. 

Topics List:   

1.     Zero Day Exploits employed for economic or military advantage (five pages on this topic ONLY)

2.     Cyber Crime, Cyber Terrorism and threats to SCADA systems

3.    Private sector businesses compliance with government IT security regulations to protect national security

4.     Meta-Data collected and used by the Private sector and Public sector

5.     Vulnerability assessments for Mobile Devices in the BYOD environment

6.     Threats to copyright and ownership of intellectual property

 

 

Rubic 

Criteria

Excellent A (90+)

Satisfactory B (80-89)

Needs Improvement (below 80)

Team work plan (10%)

The team agreement and the work plan for the team assignment are thorough and complete.

 

The team agreement and the work plan for the team assignment are complete.

The team agreement and the work plan for the team assignment are not complete.

Identify security issues for each topic and make policy controls recommendations (25%)

Report and policy recommendations are thoroughly developed, clearly reasoned, and logically presented. Four topics include and expanded and extensive discussion of vulnerability issues, or mission goals and conflicts, or legal and liability issues. Policy controls are recommended to manage the issues.

 

Report and policy recommendations are sufficiently developed and logically presented.

Report and policy are not sufficiently developed and/or logically presented.

Human Factors are linked to effectiveness of policy controls (20%)

An expansive number of Human Factors are clearly described and linked to security issues and designated policy controls. The strong or weak, and positive or negative influences of Human Factors on cyber policy are clearly explained or successfully argued.  

 

A moderate number of Human Factors are described, but not clearly linked to controls.  Influences are not clearly explained.

Human Factors are not sufficiently described.  Influences are not clearly explained.

Apply topics covered in this course (25%)

Report  demonstrates extensive application of concepts for human aspects of cybersecurity, ethics, cybercrime, privacy, and other topics covered in the twelve weeks of this course. Team demonstrates mastery of course content.

 

Report and policy demonstrate adequate application of topics covered in this course. Team demonstrates comprehension of course topics.

Report and policy do not demonstrate adequate application of topics covered in this course. Team does not demonstrate comprehension of course topics.

Organization (10%)

The Table of Contents (TOC) and the document sub-headings reflect a careful outline of the questions asked in the assignment. The content is well organized, with content clearly linked to the TOC, and with clear transitions among major subtopics.

 

The content is generally well organized with some improvement possible in transition among subtopics.

The organization of the content is confusing without clear transitions among subtopics.

Writing Style (5%)                      

The introduction is written to give a preview of each sub-heading topic. Graduate-level writing is reflected throughout the assignment including accurate spelling, punctuation, grammar, and sentence structure.

 

Writing is acceptable, with few errors in spelling, punctuation, grammar, and sentence structure.

Writing does not meet graduate standards.  Unacceptable number of errors  in spelling, punctuation, grammar, and/or sentence structure.

Use of Proper APA  Formatting

(5%)

In-text citations are in proper APA format and all sources are identified in the reference list and cited in proper APA format.

 

Minor errors in APA formatting of citations and references.

Unacceptable number of errors in APA formatting of citations and references.

Answers

(118)
Status NEW Posted 19 Apr 2017 05:04 AM My Price 10.00

-----------

Attachments

file 1492579082-Mobile Devices in the BYOD environment.docx preview (891 words )
----------- Vu-----------lne-----------rab-----------ili-----------ty -----------Ass-----------ess-----------men-----------ts -----------for----------- Mo-----------bil-----------e D-----------evi-----------ces----------- in----------- th-----------e B-----------YOD----------- En-----------vir-----------onm-----------ent----------- N-----------ame----------- I-----------nst-----------itu-----------tio-----------n ----------- M-----------obi-----------le -----------dev-----------ice-----------s a-----------re -----------inc-----------rea-----------sin-----------gly----------- be-----------com-----------ing----------- pa-----------rt -----------of -----------man-----------y p-----------eop-----------le -----------per-----------son-----------al -----------liv-----------es -----------and----------- ma-----------ny -----------org-----------ani-----------zat-----------ion-----------s a-----------re -----------rea-----------liz-----------ing----------- th-----------at -----------the-----------ir -----------emp-----------loy-----------ees----------- in-----------cre-----------asi-----------ngl-----------y d-----------esi-----------re -----------to -----------uti-----------liz-----------e b-----------oth----------- co-----------rpo-----------rat-----------e-p-----------rov-----------ide-----------d d-----------evi-----------ces----------- as----------- we-----------ll -----------as -----------the-----------ir -----------own----------- pe-----------rso-----------nal----------- mo-----------bil-----------e d-----------evi-----------ces----------- to----------- pe-----------rfo-----------rm -----------wor-----------k. -----------The----------- or-----------gan-----------iza-----------tio-----------ns -----------fin-----------d i-----------t i-----------mpo-----------ssi-----------ble----------- to----------- ph-----------ysi-----------cal-----------ly -----------blo-----------ck -----------the----------- ut-----------ili-----------zat-----------ion----------- th-----------ese-----------
file 1492579095-cybersecurity in the organization.docx preview (3542 words )
P-----------rep-----------are----------- a -----------sho-----------rt -----------pap-----------er -----------of -----------app-----------rox-----------ima-----------tel-----------y 8------------12----------- ( -----------dou-----------ble----------- sp-----------ace-----------d)p-----------age-----------s i-----------nve-----------sti-----------gat-----------ing----------- th-----------e s-----------tra-----------teg-----------ic -----------imp-----------act----------- of----------- cy-----------ber-----------sec-----------uri-----------ty -----------in -----------the----------- or-----------gan-----------iza-----------tio-----------n w-----------ith----------- a -----------spe-----------cia-----------l f-----------ocu-----------s o-----------n i-----------ts -----------eth-----------ica-----------l a-----------nd -----------leg-----------al -----------imp-----------lic-----------ati-----------ons-----------. T-----------he -----------pap-----------er -----------mus-----------t i-----------ncl-----------ude----------- at----------- le-----------ast----------- 10----------- li-----------ter-----------atu-----------re -----------sou-----------rce-----------s a-----------nd -----------may----------- be----------- in-----------clu-----------de -----------the----------- fo-----------llo-----------win-----------g t-----------opi-----------cs:----------- C-----------ybe-----------rse-----------cur-----------ity----------- as----------- an----------- or-----------gan-----------iza-----------tio-----------nal----------- st-----------rat-----------egy-----------: a----------- li-----------ter-----------atu-----------re -----------rev-----------iew----------- I-----------mpl-----------eme-----------nti-----------ng -----------a c-----------ybe-----------rse-----------cur-----------ity----------- st-----------rat-----------egy-----------: l-----------ega-----------l, -----------eth-----------ica-----------l, -----------and----------- te-----------chn-----------ica-----------l
Not Rated(0)