Course Objective: Critically assess the intellectual property and digital rights management and other legal issues that exist in cyberspace. Apply concepts covered throughout the 12-week cybersecurity policy course. Design effective organizational cybersecurity standards and policies.
Competencies: Critical thinking, team-building skills, communication skills
Directions:
Throughout the semester we have studied how human factors can influence policy choices for domestic and international cybersecurity issues.
Some of the Human Factors we have studied:
1. Ethics and Culture -- Weeks 3, 4,8
2. Psychological Motivations -- Weeks 5, 6, 7
3. Anonymity --- Weeks 9, 11
Each team will select FOUR cybersecurity topics from the list provided below, and will research the influence of Human Factors on recommended cybersecurity policy controls.
Writing Assignment: Choose (4) from the Topics List near the bottom of these instructions, then answer these questions:
• What are the major cybersecurity issues related to each of the 4 topics chosen?
• What policy controls would your team recommend to help manage each of the 4 cybersecurity issues?
• Discuss how Human Factors influence the effectiveness of these recommended policy controls.
Discussion for each topic should include --
A. The topic name and important security issues (vulnerability issues, or mission goals/conflicts issues, or legal/liability issues),
B. Recommended policy controls, and
C. How or why human factors can influence the effectiveness of each recommended policy control.
Hint: To improve chances for a higher score, construct an outline of the questions asked before starting any research or writing. The outline is not submitted, but it should be used to help create the TOC. The Introduction should demonstrate that a careful outline was done before writing, and the introduction should also preview the content of the research paper.
Choose FOUR topics from the list below.
Topics List:
1. Zero Day Exploits employed for economic or military advantage
2. Cyber Crime, Cyber Terrorism and threats to SCADA systems
3. Private sector businesses compliance with government IT security regulations to protect national security
4. Meta-Data collected and used by the Private sector and Public sector
5. Vulnerability assessments for Mobile Devices in the BYOD environment
6. Threats to copyright and ownership of intellectual property
Length 12-14 pages due at the end of Week 12: 11:59 p.m. eastern time on Sunday.
There will be NO EXTENSIONS for this assignment.
Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.
Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.