Cyber Threats, Analysis, Discovery, and Solutions

Cyber Threats, Analysis, Discovery, and Solutions

Background
Cyber Threats, Analysis, Discovery, and Solutions
Required Videos

10 biggest computer hacks of all time. (2015, September 16). Top Trending. Retrieved from https://www.youtube.com/watch?v=oOoMqgnvZaY

DEFCON 20: the art of cyberwar. (2013, August 17). Hackers Security. Retrieved from https://www.youtube.com/watch?v=siaJRA4QpsQ

Training future cybersecurity warriors. (2015, April 26). CBS Sunday Morning CBS Sunday Morning. Retrieved from https://www.youtube.com/watch?v=XLLmf080J_I
Required Reading

Chabinsky, S. (2016). Six steps towards a better cyber risk management strategy. Security, 53(1), 46. Retrieved from Trident Library ProQuest

Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67. Retrieved from Trident Library ProQuest

Martemucci, M. (2015). Unpunished insults the looming cyber Barbary wars. Case Western Reserve Journal of International Law, 47(1), 53-62. Retrieved from Trident Library ProQuest

McDowell, M. (2013, February). Security Tip (ST04-015) Understanding denial-of-service attacks. US-CERT is part of the Department of Homeland Security. Retrieved from https://www.us-cert.gov/ncas/tips/ST04-015

Shackelford, S., Proia, A., Martell, B., Craig, A. (2015). Toward a global cybersecurity standard of care: Exploring the implications of the 2014 NIST cybersecurity framework on shaping reasonable national and international cybersecurity practices. Texas International Law Journal, 50(2), 305-355. Retrieved from Trident Library ProQuest
Optional Reading

Stanton, T. (2006). Meeting the challenge of 9/11: Blueprints for more effective government. Armonk, NY, USA: M.E. Sharpe, Inc., Retrieved from Trident Library ProQuest Case
Cyber Threats, Analysis, Discovery, and Solutions
Case Assignment

Cyberspace is a war-fighting domain in the cyber threat battlefield. It, therefore, becomes important to prioritize the best practices, analysis, discovery, and solutions in dealing with cyber threats. The primary goal is to be able to communicate about any developing cyber threats and adopting a global awareness of these cyber security threats. This is accomplished by promoting consistency and awareness. This benefits both our government and business communities, across domestic and global jurisdictions, while also promoting cyber solutions that can contribute to cyber peace.

For this Case, answer the following:

Explain cyber threats, analysis, discovery, and solutions as they correlate to cyberspace as a war-fighting domain.
Cyber risk management strategies are everyone’s responsibility. List six steps of a cyber risk management strategy.
Is the study of cyber threats, analysis, discovery, and solutions limited by any domestic or global jurisdictions? Explain.

Assignment Expectations

Refer to Module 1 for Assignment Expectations

Order from us and get better grades. We are the service you have been looking for.