25 Feb Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on sources that give details about your research topic. Next, write the reference list entry (
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on sources that give details about your research topic. Next, write the reference list entry (APA citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library's "Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.
- Authors. (date). Article title. Publication name, vol(issue), #-#.
- Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
- Authors. (date). Book title. City, state (or country) of publication: Publisher.
Next, write your annotations for each source in your list. In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of the quality and usefulness of the information; you will be combining the descriptive and analytical styles of annotations.
To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually the first two chapters). From this information, develop a short informative or descriptive summary of the source that includes: (a) a description the information provided in the source, (b) how you plan to use this source to support your analysis of your research topic, and (c) your thoughts and opinions about the utility or quality of the source. Each annotation should be approximately 100-125 words (five to seven sentences). Place this summary after the reference list entry for the source.
For more information about annotated bibliographies, see https://libguides.umgc.edu/annotated-bibliography-apa
Submit your annotated bibliography for review and feedback from your instructor.
This project is an individual effort that you will work on throughout your capstone course for your Master of Science degree. In this project, you will research cybersecurity capacity building and then develop a proposal to help build (improve) cybersecurity capacity by improving a small nation's cybersecurity education and training for its workforce. You will also research public-private partnerships and additional international efforts whereby nations and multinational organizations cooperate to improve global cybersecurity including efforts wherein they provide expertise and other types of assistance to nations needing to improve their cybersecurity capabilities.
Your work will be evaluated using the competencies listed below.
· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
· 7.1: Evaluate national cybersecurity policy.
· 7.4: Knowledge of policies, processes, and technologies that are used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, and equipment, and to manage mitigation strategies that achieve the security needed at an affordable cost.
Read: Collett, R., & Bampaliou, N. (2021). International cyber capacity building: Global trends and scenarios. https://www.iss.europa.eu/sites/default/files/EUISSFiles/CCB%20Report%20Final.pdf
In this report, the authors discuss the findings of an international research study, sponsored and supported by the European Commission. The purpose of this study was to identify trends in cyber capacity building and included information derived from interviews with subject matter experts representing 50 organizations from around the world (See Annex 1. List of Interviews). Secondary data was obtained from public sources including government and organizational websites and document repositories.
Read: Ramim, M. M., & Hueca, A. (2021). Cybersecurity capacity building of human capital: Nations supporting nations. Online Journal of Applied Knowledge Management, 9(2), 65–85. https://doi-org.ezproxy.umgc.edu/10.36965/ojakm.2021.9(2)65-85
In this article, the authors discuss a cybersecurity capacity building framework and the roles that various nations and organization play in helping building cybersecurity capacity on a global basis.
Step 2: Research International Cooperation and Joint Efforts to Improve Global Cybersecurity
The resources listed below provide information about current international efforts to improve global cybersecurity through cooperation between nations through projects involving businesses, governments, nongovernmental organizations, and individuals. As you review these materials, focus on the benefits of cross-border cooperation for the purposes of combating cybercrime, cyberattacks, and cyberterrorism. Continue your research by identifying additional, international efforts to promote cybersecurity capacity building.
· Government to Government Cooperation to Improve Global Cybersecurity
· The Commonwealth Telecommunications Organization: https://www.cto.int/ and https://www.cto.int/consultancy/multi-stakeholder-partnerships-for-ict4d/
· Commonwealth Approach for Developing National Cybersecurity Strategies https://ccdcoe.org/uploads/2019/09/CommW-15-Approach-for-developing-national-cybersecurity-strategies.pdf
· United Nations International Telecommunications Union (ITU) Guide to Developing a National Cybersecurity Strategy https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-CYB_GUIDE.01-2018-PDF-E.pdf
· Global Cooperation for Cybercrime Prevention
· Budapest Convention on Cybercrime https://www.coe.int/en/web/cybercrime/home
· INTERPOL https://www.interpol.int/en/Crimes/Cybercrime
· https://www.interpol.int/en/Crimes/Cybercrime/Public-private-partnerships
· Public-Private Partnerships and Their Use to Solve Global Problems
· https://ppp.worldbank.org/public-private-partnership/overview/what-are-public-private-partnerships
· https://isalliance.org/policy-advocacy/public-private-partnership/
· https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/Overview/
· FIRST: Improving Cybersecurity Together https://www.first.org/
· Recruiting and Deploying Volunteers as Cyber Experts (Example Programs)
· https://iamcybersafe.org/s/volunteers
· https://engage.isaca.org/volunteeropportunities/howtovolunteer
· https://cyberpeaceinstitute.org/news/cyberpeace-builders-supporting-ngos-in-the-age-of-cyber/
Step 3: Discuss Cultural Issues as Potential Barriers to Success in Cyber Capacity Building
Participate in a discussion with your peers about cultural Issues as potential barriers to success in international cooperative efforts. Use examples from your reading and research for Steps 1 and 2 along with information from the following resources:
· https://www.hofstede-insights.com/models/national-culture/
· http://www.culture-at-work.com/highlow.html
Step 4: Discuss Ethical Issues as Potential Barriers to Success in Cyber Capacity Building
Read: Ethics and Ethical Decision Making
Participate in a discussion with your peers about ethical Issues as potential barriers to success in international cooperative efforts. Use examples from your reading and research for Steps 1, 2, and 3 along with information from additional sources from your personal research. Ground your discussion in one or more of the ethical theories or principles discussed in the learning topic Ethics and Ethical Decision Making.
Step 5: Research the Use of Training and Certifications to Build Cybersecurity Capacity
In this step, you will continue your research and analysis of cyber capacity building by examining the role that training and certifications plays in the development and growth of a professional cybersecurity workforce for nations around the world. Begin by reading these scholarly articles:
Blažič, B. J. (2021). The cybersecurity labour shortage in Europe: Moving to a new concept for education and training. Technology in Society, 67. https://doi-org.ezproxy.umgc.edu/10.1016/j.techsoc.2021.101769
Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security, 100. https://doi-org.ezproxy.umgc.edu/10.1016/j.cose.2020.102080
International (multinational) organizations such as CompTIA, EC-Council, ISACA, and the Information Systems Security Consortium play a large role in the provision of training and in certifying the knowledge, skills, and abilities. Training and certifications are also provided by technology vendors such as CISCO and Microsoft. Consider the following types of certifications and assess their value to nations as potential solutions to the need for professionalization of the cyber workforce.
· Basic and Advanced Cybersecurity Knowledge and Skills
1. CISCO Certifications: CCNA-Security, CCNA Cyber Ops
2. CompTIA Certifications: Security+, Network+, CASP
3. EC-Council Certifications: CSCU, CEH, CHFI, CTIA, C|CISO
4. ISACA Certifications: CISA, CISM, CRISC
5. (ISC)2 Certifications: CAP, CISSP, CSLP, SSCP
· Related Knowledge and Skills
1. Business Skills Certifications: PMI-PBA, PMI-PMP
2. Risk Management Certifications
3. Disaster Recovery Certifications
4. Operating Systems Administration Certifications (MS Windows, Linux, etc.)
Note: Additional cybersecurity workforce certifications can be found in the US Department of Defense list of baseline certifications: https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/
Step 6: Prepare an Annotated Bibliography
1. Authors. (date). Article title. Publication name, vol(issue), #-#.
2. Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
3. Authors. (date). Book title. City, state (or country) of publication: Publisher.
Next, write your annotations for each source in your list. In an annotated bibliography , the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of the quality and usefulness of the information; you will be combining the descriptive and analytical styles of annotations.
To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually the first two chapters). From this information, develop a short informative or descriptive summary of the source that includes: (a) a description the information provided in the source, (b) how you plan to use this source to support your analysis of your research topic, and (c) your thoughts and opinions about the utility or quality of the source. Each annotation should be approximately 100-125 words (five to seven sentences). Place this summary after the reference list entry for the source.
For more information about annotated bibliographies, see https://libguides.umgc.edu/annotated-bibliography-apa
Submit your annotated bibliography for review and feedback from your instructor.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.