When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?
INT 2681…..3
Do the following labs in testout
lab 3.3.3
lab 3.1.10
lab 4.1.7
lab 4.2.3
lab 4.2.5
lab 4.2.6
lab 4.2.9
lab 5.1.5
lab 5.1.6
lab 6.1.9
lab 6.1.11
lab 6.1.12
lab 6.2.4
lab 7.4.5
lab 7.4.6
lab 7.4.7
lab 7.4.8
lab 7.4.9
All labs in chapter 8
All labs in chapter 9
All labs in chaper 10
All labs in chapter 11
All labs in chapter 12
All labs in chapter 13
All labs in chapter 14
All labs in chapter 15
how the course is applied in workplace
What was your Main term course? Reflect on the connection between knowledge or concepts from this courses and how those have been or could be applied in the work place.
Include the following: Course Name, Course ID, and a 300 word description of how knowledge and skills obtained in this course were applied in your current position or an employment opportunity in your field of study.
Cybersecurity Strategy, Law, and Policy
The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.
The CTO has asked you to collaborate with your team to provide the organizational input.
You will be collaborating with your previously assigned team on this assignment. It is up to the team members to decide how they will plan, meet, discuss, and complete the six sections of the paper. Remember, if a member fails to complete his or her part of the work, the team is still responsible for all sections. You will also complete a peer review for yourself and for each member of the team. The peer feedback will be incorporated into each team member’s assignment grade.
As a group, use the Cybersecurity Strategy, Law, and Policy Team Assignment Template to write your paper, which should cover the following topics:
Part 1: National Security Strategy and Cybersecurity
- After reading the National Security Strategy (2017), comment on the following.
- Should the United States create a separate cybersecurity strategy to be published alongside the National Security Strategy (NSS), or do you feel the NSS is sufficient? Why or why not?
- Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity?
- Should the United States create a separate cybersecurity strategy to be published alongside the National Security Strategy (NSS), or do you feel the NSS is sufficient? Why or why not?
Part 2: Public/Private Partnerships
- After reading the Cybersecurity Act of 2015, address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.
- What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
- On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers’ private data?
- The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?
- What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
Part 3: Private Sector Organizations
- Review the General Data Protection Regulation (GDPR) of the European Commission (EU). It includes many provisions and arguably strengthens data protection for individuals within the EU. It even includes the right to be forgotten. The United States does not have a similar regulation. There have only been a few regulations implemented related to US citizens’ private data, which include medical and financial industries. Some argue implementing regulation such as GDPR in the United States would hinder innovation. They contend that the End User License Agreements (EULA) provide sufficient protections and allow the citizens to make the choice of what is and is not shared.
- As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?
- As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?
Part 4: Protecting Critical Infrastructure and the Homeland
- The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
- What does that mean to private organizations such as yours?
- If most critical infrastructure in the United States is owned by the private sector, what responsibility does the DoD have in this regard?
- Some would argue US laws are outdated and thus the DoD has little authority to assist. Others would argue US laws were purposely established such that the private sector would defend itself and not need assistance from the military. Obviously, for the DoD to assist, it would need the private organizations’ data. Said another way, the DoD would need your data as a private citizen/customer of that organization. Those that believe our laws need to be updated argue giving up privacy for protection is legitimate.
- Others will argue that we should not give private information of citizens to the government for any reason. As a citizen, would you feel comfortable with this? As a private organization, would you feel comfortable giving information that may contain your customers’ private data to the DoD?
- Is there a third solution (middle ground) you would propose that enables privacy but also enables cybersecurity?
- What does that mean to private organizations such as yours?
Part 5: Cybersecurity Technologies
- The authors of the National Security Strategy (NSS) are looking to address particular technologies that have the opportunity to revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that has the ability to significantly improve cybersecurity.
- What would be your recommendation for how the NSS should incorporate this technology to the public?
- Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman’s terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.
- What would be your recommendation for how the NSS should incorporate this technology to the public?
Part 6: Ethics in Cybersecurity.
- Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional.
- What are the ethically significant harms that may result from mass surveillance (including by government and corporations)?
- What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning.
Notes
- While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.
- Use additional sources as needed and be sure to critically analyze the questions, addressing the pros and cons in your proposal.
- Use visuals where appropriate.
- Each team will submit one assignment.
- You will receive an individual grade for this assignment based on your contribution to the overall project.
HCI-W3
Usability Journal
Usability Journal – write three (3) journal entries.
- Each entry shall be approximately 500 words each.
- Each entry shall focus on an object that contains a bad usability design. These are PHYSICAL objects, not software or website interfaces.
- Explain why the object being described does not maintain good usability practices.
- The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.
Example:
- A remote control.
- What about the remote control makes the device both a good and bad example for the usability perspective?
- Each deliverable will contain:
- Three entries with 300-400 words for EACH entry
- APA citation with examples from scholars explaining best practices that should be followed
- An example image of the bad design practice followed
- An example of good potential practices to follow
Human computer interaction and usability
- A Usability Evaluation examines the way users interact with products and services in order to achieve a goal. Often times, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:
- Learnability
- Findability
- Satisfaction
- Efficiency
- Memorability
- Effectiveness
- Ease of Use
- Error Handling
- Remember, usability is not one-dimensional. It is a complex system of properties that integrates many factors. It is subjective from user to user. For this assignment, you are asked to explore one of these topics. You are to conduct an analytical research review of the assigned usability category/dimension above by evaluating 6-10 academic journals that focus on this topic.
You MUST include the following as part of the assignment.
- Abstract
- Title Page
- Introduction
- Literature Review of Term
- Conclusion
- Considerations:
- Must provide a minimum of six sources and how it was evaluated by the authors/scholars in each study
- Must evaluate the study method used to complete the analysis.
- Identify any unique similarities or differences across each study.
- Define your own term based on your understanding of the literature you’ve evaluated.
- Explain how you derive this definition.
- Qualify/quantify the definition by explaining how many sources you used to come up with this definition.
- Make Recommendations of Additional Ideas For Future Literature Review Consideration
- The paper should be a minimum of 6 pages. This does not include the cover page, abstract, or citations. You must use APA format throughout the entire paper.
analytical memo
write an analytical memo 1 page
Write an analytic memo as if you were the researcher. Questions to consider: What patterns do you notice? What are the ideas/themes? If you were categorizing and coding the data thematically, what ideas stand out most? How do the participants differ in how they approach the question? How does each participant’s experience impact the way they answered the question? What qualitative “findings” or interpretations can you make with this sample data set?
introduction to computer
- What are the five functions of Microsoft Word?
- How can you apply them in a resume document?
- How do you tailor a resume to a job post? (Use details)
AI helping with protecting people's health
AI is a growing topic and the use of data can have an impact on the way we live our lives. If technology could predict when someone is buying enough cigarettes to put them at more risk for cancer, or by purchasing an increasing amount of fast food that could cause health problems in the near future, would this be acceptable? How do you believe the laws regarding AI need to evolve to protect the way we live our lives? What laws would you implement to protect consumer information?
Module 04: Critical Thinking (Collaborative Technologies and the Internet of Things (IoT)
Collaborative Technologies and the Internet of Things (IoT)
The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.
- Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
- Discuss the potential impact that IoT can have on how people live.
- Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
- How has the IoT been impacted by the pandemic? Explain specific examples.
Required:
· Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
· Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Transactions on Internet Technology (TOIT) – Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1–4.https://doi.org/10.1145/3361071
· Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective. ACM Computing Surveys, 54(5), 102.
· Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks. IEEE Internet of Things Journal, 7(12), 11473–11491.
· Recommended:
should meet the following requirements:
- Be 4-5 pages in length
- Use APA (7th ed) style guidelines.
- Support yourWOEK with course material concepts, principles, and theories from the textbook and at least 7 seven scholarly, peer-reviewed journal articles.
- Add some Figure, table, Visuals (important )