Cybersecurity

  7.2 Literature Review Funnel/Organizer Overview: While the literature review funnel is not necessarily a part of the actual dissertation, the purpose here is to think about the most logical way to organize your future lengthy chapter 2.Directions: View the rubric to make sure you understand the expectations of this assignment. DSRT 837 Rubric Adapted … Read more

Discussion board

  Terrorism preparedness and response (and attempts to prevent terrorism altogether) have added significant strain to already stretched state and local budgets. If local governments determine their own level of risk/vulnerability and act accordingly, other programs will suffer as a result of budget reallocations. Should local governments establish minimum standards and levels of preparedness, regardless … Read more

Supply Chain Security

Week 7 Discussion – Supply Chain Security For your initial post,  discuss topics below. Respond to posts for other students topics. Supply Chain Security: Describe roles and responsibilities within an organization that help assure proper security when purchasing hardware, software, and network equipment from external suppliers.  What types of cybersecurity vulnerabilities can a supplier of computer services introduce into a … Read more

Creating an Effective Disaster Recovery Plan

  Discuss how a proper disaster recovery plan should be created. For this discussion, point out all the key elements of a disaster recovery plan and how these elements should be implemented. Respond to two peers.   Compare and contrast their disaster recovery plans with yours.  Expound on key differences and similiarities. 

Motivations of Threat Actors

For your initial post, discuss all points in the two topics below. Respond to posts from other students. Motivations of Threat Actors – Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and (3) world view as a political or social activist.  What kinds of targets do each … Read more

SECURE CLOUD ARCHITECTURE

Go to the Amazon Web Service (AWS) website at the link below and look for a customer success story that interests you and write about it. https://aws.amazon.com/solutions/case-studies/?nc2=h_ql_le_css&customer-references-cards.sort-by=item.additionalFields.publishedDate&customer-references-cards.sort-order=desc&awsf.customer-references-location=location%23americas&awsf.customer-references-segment=customer-segment%23enterpriseLinks to an external site. There are at least 50 there – so don’t choose the first one.  Look at the other posts and choose different companies. Select one … Read more

Week 8

Choose one of this course’s substantive weekly topics, then explain how and why the current cybersecurity-related statutes, regulations and policies related to your chosen topic developed as they did.  Based on what you have learned in this course, offer your observations as to whether these laws and policies should change to better fit the cybersecurity … Read more

Week 7

Judge the efficiencies (or lack thereof) of the current regulatory and policy net neutrality system that affects Americans usage of the internet.  You will evaluate net neutrality through the lens of comparing and contrasting at least two such legal authorities. 

Week 6

Assume that you are the chief legal administrator for a hypothetical law firm that is considering accepting cryptocurrencies from its clients for the legal services that it renders.  The senior law firm partner has asked you to design and explain a proposed procedural checklist / outline that addresses how the law firm may be able … Read more