Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Case Study #4: How can we improve global cooperation to respond to cybersecurity

ID: 3587839 • Letter: C

Question

Case Study #4: How can we improve global cooperation to respond to cybersecurity challenges in cyberspace?

Case Scenario:

For this case study, you are asked to (a) read the International Chamber of Commerce’s Cybersecurity Guide for Business and (b) watch three scenario segments from the “Scenario Based Planning” session at the 2015 Global Conference on Cyber Space. After you have done so, develop your answer to the question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

Your audience for this case study is a panel session at a conference attended primarily by industry representatives from U.S. companies. Your task is to prepare a two to three page white paper which summarizes your response to the question. [This paper would be provided to session attendees in advance of the panel discussion.]

Research:

Watch the Scenario Based Planning video from the 2015 Global Conference on Cyber Space https://www.youtube.com/watch?v=8kyj2HBqDyM

Start of Session is at 5:05:00 on Live Stream Channel #1 (or click on “Scenario Based Planning” menu item in lower left hand corner of video at startup).

The three “scenario videos” (approx. 6 mins each) occur at the following times in the livestream channel recording:

5:11:00 – 5:17:30

5:35:30 – 5:41:30

6:05:30 – 6:12:10

End of Session is at 6:28:00

Review the recommendations from the International Chamber of Commerce Cybersecurity Guide for Business https://cdn.iccwbo.org/content/uploads/sites/3/2015/08/ICC-Cyber-Security-Guide-for-Business.pdf

Find three or more additional sources to support your answer to the case question.

Write:

Using standard terminology (see case study #1), write a two to three page response to the panel question. At a minimum, your summary must include the following:

An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity challenges. This introduction should focus on political, economic, and social factors.

A separate section in which you discuss the business need for cooperation on a global basis. This discussion should include examples of global, multinational business which operate in cyberspace and the cybersecurity challenges each business faces. Use the “global” companies from the Industry Profile Project as your examples. These companies include: Amazon, Apple, eBay, Facebook, Google, Microsoft, Oracle Corp., Priceline, Salesforce, Twitter, and Yahoo.

A separate section in which you identify and discuss three or more specific cooperative efforts (e.g. alliances, associations, public/private partnerships) which currently exist. These may be industry specific, national, or international efforts.

A separate section (“Recommendations”) in which you identify, discuss, and recommend three or more specific actions which global businesses as a whole can take to improve cooperation within and across industries for the purposes of addressing the cybersecurity challenges which you previously identified. This section should provide an overall answer to the general question: How can we improve global cooperation in response to cybersecurity challenges in cyberspace?

A separate closing section in which you summarize the issues and recommendations for improving global cooperation to respond to cybersecurity challenges in cyberspace.

Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #4 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 15% of the assignment grade.

You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.

Explanation / Answer

Now a days the most common issue in IT industry is cyber security.

Cyber security contains technologies, tools, procedures and protocols to make our information safe and secure from unauthorized access at a any time. Cyber security is necessary for network, data and application security.

Every day, the world is becoming like a global village. The business are expanding globally. Things are easily accessible to consumers around the globe. The internet market is doing business in billions of dollars. Consumers, companies, banks are collecting, storing and sharing their information globally and this sharing of information on the internet is demanding a more robust, globally cooperative and collaborative environment for cyber security.

Cyber security has influence at every aspect of life, nowadays transport technology, communications technology, defense technology and global markets are totally dependent on cyber networks. Intrusion to these networks and its related information will have the impact on the social life of people. This social impact can hit the markets and can change the dynamics of the economics and other aspects of countries.

The Internet is a world development and not an excellent follower of national boundaries. The knowledge and technologies we have are reachable to everyone globally. From a security and management viewpoint, this cannot be one thing that any single government can manage on its own. To allow boundaryless movement of data with a secure method, governments need to work together to place the correct policies and incentives that feature cooperating on catching cyber criminals. It involves the matter of making certain consumers to get the simplest, most secure technology despite wherever it's created. Companies are now working hard to sit together to solve these challenges because companies are operating globally are in front of cyber security threats. There are many companies having a global presence like Facebook, Google, Microsoft, Amazon and many others.

As cyber security is becoming a global challenge and to address this challenge there are many organizations and association working together to make a safe and secure cyberspace. They are working on# standardizing the equipment, hardware, software and services and in addition to this, they are working to educate organizations how they can make their infrastructure secure from cyber attacks. Some of them are

Center for Internet Security (CIS)

It is composed of roughly 180 members from 17 different countries. CIS strives to improve global internet security by creating and fostering a trustable and secure environment to bridge the public and private sectors. In addition, at the national and international level, CIS plays an important role in forming security policies and decisions. CIS has four divisions: the Central Intelligence Center, the Multi-State Information Sharing and Analysis Center (MS-ISAC), Security Benchmarks, and the Trusted Purchasing Alliance. Through these four divisions, the Center for Internet Security works with a wide range of entities, including those in academia, the government, and both the private sector and general public to increase their online security by providing them with products and services that improve security efficiency and effectiveness.

The Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible so that individuals and organizations worldwide can make informed decisions about true software security risks.

National Cybersecurity and Communications Integration Center (NCCIC)

The NCCIC shares information among public and private sector partners to build awareness of vulnerabilities, incidents, and mitigations. Cyber and industrial control systems users can subscribe to information products, feeds, and services at no cost. This organization is responsible for protecting cyber infrastructure of government and public sector. Its major responsibility is to increase the security of an automated system that is responsible for the operation of national critical infrastructure. It is also working on National Cyber Incident Response Plan (NCIRP) in collaboration with the public sector.

Today the cyberspace is a critical component for all industries across the globe. The public and private sector are facing this challenge and they are in need of full proof cyber security system which can benefit all organization globally. Enhancing cybersecurity and combating crime and engagement and cooperation by a range of participants: among nations, across corporations, and between government and also the non-public sector is required to overcome this challenge. Some of the necessary steps that should be taken are

.