Creating an Effective Disaster Recovery Plan

  Discuss how a proper disaster recovery plan should be created. For this discussion, point out all the key elements of a disaster recovery plan and how these elements should be implemented. Respond to two peers.   Compare and contrast their disaster recovery plans with yours.  Expound on key differences and similiarities. 

Motivations of Threat Actors

For your initial post, discuss all points in the two topics below. Respond to posts from other students. Motivations of Threat Actors – Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and (3) world view as a political or social activist.  What kinds of targets do each … Read more

SECURE CLOUD ARCHITECTURE

Go to the Amazon Web Service (AWS) website at the link below and look for a customer success story that interests you and write about it. https://aws.amazon.com/solutions/case-studies/?nc2=h_ql_le_css&customer-references-cards.sort-by=item.additionalFields.publishedDate&customer-references-cards.sort-order=desc&awsf.customer-references-location=location%23americas&awsf.customer-references-segment=customer-segment%23enterpriseLinks to an external site. There are at least 50 there – so don’t choose the first one.  Look at the other posts and choose different companies. Select one … Read more

Week 8

Choose one of this course’s substantive weekly topics, then explain how and why the current cybersecurity-related statutes, regulations and policies related to your chosen topic developed as they did.  Based on what you have learned in this course, offer your observations as to whether these laws and policies should change to better fit the cybersecurity … Read more

Week 7

Judge the efficiencies (or lack thereof) of the current regulatory and policy net neutrality system that affects Americans usage of the internet.  You will evaluate net neutrality through the lens of comparing and contrasting at least two such legal authorities. 

Week 6

Assume that you are the chief legal administrator for a hypothetical law firm that is considering accepting cryptocurrencies from its clients for the legal services that it renders.  The senior law firm partner has asked you to design and explain a proposed procedural checklist / outline that addresses how the law firm may be able … Read more

Securing the Internet of Things (IoT)

Create the legal and ethical foundation for a hypothetical business that works in the IoT field so that the company can integrate such concerns into its cybersecurity framework.  Pay close attention to those matters which could most closely affect the public, who may not fully understand the enormity of such inter-related concerns.  Provide theoretical procedures … Read more

Cybersecurity and Civil Law

Predict how present day legal and ethical concerns associated with cybersecurity may apply to possible insurance claims within the foreseeable future.  As you do so, please be sure to apply facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together.

Evaluate the types of security assessments, select one that you might use, and explain why it is important.

Evaluate the types of security assessments, select one that you might use, and explain why it is important. Of the top nine areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached that way. 5-10 sentences All content posted … Read more