Critically assess the intellectual property and digital rights management and other legal issues that exist in cyberspace
-Vulnerability assessments for Mobile Devices in the BYOD environment.
-Zero Day Exploits employed for economic or military advantage
-Cyber Crime, Cyber Terrorism and threats to SCADA systems
-Meta-Data collected and used by the Private sector and Public sector
What are the major cybersecurity issues related to each of the 4 topics listed above?
What policy controls would your team recommend to help manage each of the 4 cybersecurity issues?
Discuss how Human Factors influence the effectiveness of these recommended policy controls.
Discussion for each topic should include --
A. The topic name and important security issues (vulnerability issues, or mission goals/conflicts issues, or legal/liability issues),
B. Recommended policy controls, and
C. How or why human factors can influence the effectiveness of each recommended policy control.