369951.Cyber Threat to U.S. National Security: Identify and explain the three most significant cyber threats to U.S. national security. Using the course readings and additional scholarly material justify your choices and rank order
2.U.S. Federal Government Organization and Response to Cyber Threats: U.S. Federal Government policy divides cybersecurity responsibilities among multiple departments including Homeland Security, Defense, and Justice. Some authors have criticized this as ineffective and cyber threats continue to increase. Describe how you would organize the government response and include your reasoning for changes or maintenance of the status quo. Please cite course materials and/or outside scholarly research to support your conclusions.
o Module Notes: U.S. National Cybersecurity Strategy
o Chapter 7 One Government’s Approach to Cybersecurity in Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook. Hoboken: Wiley. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edsebk&AN=535983&site=eds-live&scope=site
o Dunn, Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities Science & Engineering Ethics, 20(3), 701-715. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=97178206&site=eds-live&scope=site
o Newmeyer, K. P. (2012). Who Should Lead U.S. Cybersecurity Efforts? PRISM Security Studies Journal, 3(2), 115. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=73151318&site=eds-live&scope=site
o Trautman, L. J. (2015). CYBERSECURITY: WHAT ABOUT U.S. POLICY? Journal Of Law, Technology & Policy, 2015(2), 341. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=111930475&site=eds-live&scope=site
o Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War . Survival (00396338), 53(1), 23-40. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=57658056&scope=site
o Piggin, R. (2016). Cyber security trends: What should keep CEOs awake at night International Journal Of Critical Infrastructure Protection, Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548216300130&site=eds-live&scope=site
o Wilshusen, G. C., & Barkakati, N. (2013). CYBERSECURITY: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented . GAO Reports, 1. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=ulh&AN=86699071&site=eds-live&scope=site
o Code wars: America’s cyber threat [Video file, 43:19 minutes]. (2011). In Films On Demand. Retrieved April 20, 2016, from fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288
o The President Speaks on the Cybersecurity National Action Plan (Links to an external site.)Links to an external site. [Video file, 06:50 minutes]. (2016). Retrieved from https://www.youtube.com/watch?v=ZGFMZDQl9z0
• Review the following webpages:
o Department of Homeland Security: Cybersecurity (Links to an external site.)Links to an external site.
♣ This webpage provides an overview of the Department’s cybersecurity programs. Use it to familiarize yourself with the terms and offices involved as well as the role played by DHS in cybersecurity. We will look at this in depth later in the course
o U.S. Government Accountability Office Cybersecurity (Links to an external site.)Links to an external site.
♣ The GAO performs research at the request of Congress. It is a non-partisan government agency. This page contains links to GAO research and publications on cybersecurity issues. It provides several resources that may be useful in identifying topics for research papers as well as policy questions arising during the course
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.