Chat with us, powered by LiveChat Cyber Threats to National Security | Wridemy

Cyber Threats to National Security

369951.Cyber Threat to U.S. National Security: Identify and explain the three most significant cyber threats to U.S. national security. Using the course readings and additional scholarly material justify your choices and rank order

2.U.S. Federal Government Organization and Response to Cyber Threats: U.S. Federal Government policy divides cybersecurity responsibilities among multiple departments including Homeland Security, Defense, and Justice. Some authors have criticized this as ineffective and cyber threats continue to increase. Describe how you would organize the government response and include your reasoning for changes or maintenance of the status quo. Please cite course materials and/or outside scholarly research to support your conclusions.

Reading:
• Required
o Module Notes:  U.S. National Cybersecurity Strategy
o Chapter 7 One Government’s Approach to Cybersecurity in Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook. Hoboken: Wiley.  Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edsebk&AN=535983&site=eds-live&scope=site
o Dunn, Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities Science & Engineering Ethics, 20(3), 701-715. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=97178206&site=eds-live&scope=site
o Newmeyer, K. P. (2012). Who Should Lead U.S. Cybersecurity Efforts?  PRISM Security Studies Journal, 3(2), 115. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=73151318&site=eds-live&scope=site
o Trautman, L. J. (2015). CYBERSECURITY: WHAT ABOUT U.S. POLICY?  Journal Of Law, Technology & Policy, 2015(2), 341. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=111930475&site=eds-live&scope=site
• Optional
o Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War . Survival (00396338), 53(1), 23-40. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=57658056&scope=site
o Piggin, R. (2016). Cyber security trends: What should keep CEOs awake at night  International Journal Of Critical Infrastructure Protection, Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548216300130&site=eds-live&scope=site
o Wilshusen, G. C., & Barkakati, N. (2013). CYBERSECURITY: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented . GAO Reports, 1. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=ulh&AN=86699071&site=eds-live&scope=site
View:
• Required
o Code wars: America’s cyber threat  [Video file, 43:19 minutes]. (2011). In Films On Demand. Retrieved April 20, 2016, from fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288
o The President Speaks on the Cybersecurity National Action Plan (Links to an external site.)Links to an external site. [Video file, 06:50 minutes]. (2016). Retrieved from https://www.youtube.com/watch?v=ZGFMZDQl9z0
• Review the following webpages:
o Department of Homeland Security: Cybersecurity (Links to an external site.)Links to an external site.
♣ This webpage provides an overview of the Department’s cybersecurity programs.  Use it to familiarize yourself with the terms and offices involved as well as the role played by DHS in cybersecurity.  We will look at this in depth later in the course
o U.S. Government Accountability Office Cybersecurity (Links to an external site.)Links to an external site.
♣ The GAO performs research at the request of Congress.  It is a non-partisan government agency.  This page contains links to GAO research and publications on cybersecurity issues.  It provides several resources that may be useful in identifying topics for research papers as well as policy questions arising during the course

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA