M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and
Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
M1D1: Defining Cybersecurity
Module 1
After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and to some extent technical knowledge of computers and networks will influence your approach to cybersecurity. This activity is designed to have you examine your definition of cybersecurity and to assess its viability and effectiveness to reaching national security goals.
Question
After completing the assigned readings for the module, please respond to the following question in your initial post:
· Assume you are a staff member supporting a senior government official. You must prepare a definition of cybersecurity that the official would use in a public speech. Include in your discussion the key security issues that guided you to this definition and your approach to the challenge. Please cite course materials and/or outside scholarly research to support your conclusions.
Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format.
M1D2: Cybersecurity Paradigms
Module 1
In the assigned readings, we examined three different paradigms for approaching and improving cybersecurity. Each paradigm has its adherents, its strengths, and its weaknesses. Is one approach better than another? How does culture and national history impact the approach to cybersecurity?
This activity requires you to examine the distinct paradigms. Is a pure approach to cybersecurity possible or can tools from different disciplines be combined? What are the strengths and weaknesses of the different paradigms?
Make sure to validate your answer with required readings. You may also use other sources to strengthen your answer.
The module learning outcome addressed in this activity is:
· Explain the economic, public health, and national security paradigms for cybersecurity strategy (CO #2)
Question
After completing the assigned readings for the module, please respond to the following question in your initial post:
· Which of the three paradigms for national-level cybersecurity (national security, economic, or public health) do you think is best for a country to use in developing its cybersecurity strategy? What are the strengths and weaknesses of your chosen approach? Why is your selected approach best? Please cite course materials and/or outside scholarly research to support your conclusions.
Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format.
M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and
Module 1: Learning & Assessment Activities During this module you will: Read: Required Module Notes: Approaches to Cybersecurity Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook (Links to an external site.). Hoboken: Wiley. Chapter 1 pp 1-14. Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity (Links to an external site.). Technology Innovation Management Review, 13. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=100142627&site=eds-live&scope=site Harknett, R. J., & Stever, J. A. (2011). The New Policy World of Cybersecurity. (Links to an external site.)Public Administration Review, 71(3), 455-460. doi:10.1111/j.1540-6210.2011.02366.x. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60467442&site=eds-live&scope=site Moore, T. (2010). The economics of cybersecurity: Principles and policy options. (Links to an external site.)International Journal of Critical Infrastructure Protection, 3103-117. doi:10.1016/j.ijcip.2010.10.002. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548210000429&site=eds-live&scope=site Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for Cybersecurity. (Links to an external site.)Daedalus, 140(4), 70–92. Retrieved from http://vlib.excelsior.edu/login?url=http://search.proquest.com.vlib.excelsior.edu/docview/903303254?accountid=134966 Optional Baker, E. W. (2014). A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan (Links to an external site.). Information Technology For Development, 20(2), 122-139. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=95593148&site=eds-live&scope=site China internet: Xi Jinping calls for “cyber sovereignty.” (Links to an external site.) (2015, Dec 16). Retrieved from http://www.bbc.com/news/world-asia-china-35109453 View: Required Code wars: America’s cyber threat – Introduction (Links to an external site.). [Video file, 01:19 minutes]. (2011). In Films On Demand. Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288&loid=139413 Optional Code wars: America’s cyber threat – Full Video (Links to an external site.) [Video file, 43:19 mins]. (2011). In Films On Demand. Retrieved from http://vlib.excelsior.edu/login?url=http://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288 Discuss: M1D1: Defining Cybersecurity M1D2: Cybersecurity Paradigms Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format. Provide substantive responses to at least 2 fellow students Use the EC Library resources for research assistance and to properly cite your work: Military Leadership Research Guide (Links to an external site.) National Security Research Guide (Links to an external site.) Plagiarism & Copyright (Links to an external site.) Excelsior Library Writing Help (Links to an external site.) APA Citation Help (Links to an external site.) Excelsior College Online Writing Lab (OWL)
M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and
M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and to some extent technical knowledge of computers and networks will influence your approach to cybersecurity. This activity is designed to have you examine your definition of cybersecurity and to assess its viability and effectiveness to reaching national security goals. Question After completing the assigned readings for the module, please respond to the following question in your initial post: Assume you are a staff member supporting a senior government official. You must prepare a definition of cybersecurity that the official would use in a public speech. Include in your discussion the key security issues that guided you to this definition and your approach to the challenge. Please cite course materials and/or outside scholarly research to support your conclusions. Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format. M1D2: Cybersecurity Paradigms Module 1 In the assigned readings, we examined three different paradigms for approaching and improving cybersecurity. Each paradigm has its adherents, its strengths, and its weaknesses. Is one approach better than another? How does culture and national history impact the approach to cybersecurity? This activity requires you to examine the distinct paradigms. Is a pure approach to cybersecurity possible or can tools from different disciplines be combined? What are the strengths and weaknesses of the different paradigms? Make sure to validate your answer with required readings. You may also use other sources to strengthen your answer. The module learning outcome addressed in this activity is: Explain the economic, public health, and national security paradigms for cybersecurity strategy (CO #2) Question After completing the assigned readings for the module, please respond to the following question in your initial post: Which of the three paradigms for national-level cybersecurity (national security, economic, or public health) do you think is best for a country to use in developing its cybersecurity strategy? What are the strengths and weaknesses of your chosen approach? Why is your selected approach best? Please cite course materials and/or outside scholarly research to support your conclusions. Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs and include citations and references in APA format.
M1D1: Defining Cybersecurity Module 1 After reading the module notes and the assigned readings, you will have formed some ideas on what defines cybersecurity. Your background, field of employment, and
Module 1: Module Notes: Approaches to Cybersecurity Cybersecurity is difficult to define and can be approached from a variety of paradigms. Daily news stories highlight data breeches, infrastructure attacks, and various cybercrime events. Improving cybersecurity requires the practitioner to make changes to policies, software, and hardware. How and why those changes are made should reflect the underlying approach to cybersecurity for the individual, the firm, or the nation. This module will look at three basic paradigms for cybersecurity: national security, economic, and public health. It will also include examination of how different nations approach the cybersecurity problem. As you prepare for the discussions in this module, I recommend you review the Code Wars video. The introduction points out many of the key issues involved in the cybersecurity challenge such as the seamless nature of the Internet, the anonymity shielding potential bad actors, and the increasing importance of cyber to everyday life in the 21st Century. Bayuk, et al. (2012) provides a nice survey of the issues confronting the United States of America (U.S.) and others. It is important that each student develop his own understanding of cybersecurity. As Craigen, Diakun-Thibault, and Purse (2014) point out, there is no one accepted definition of cybersecurity. The focus changes from the technical IT person focused on protecting a specific network to the National Security Council staffer developing a national policy position. The paradigm selected will guide what tools will be employed to increase cybersecurity. Nation states also take a distinct view of what cybersecurity entails. Is it protection of networks, data, and access as argued by the United States and the liberal democracies of the West or does it also include the nature of the content as argued by China, Russia, and others (China Internet, 2015)? We will examine three different paradigms for addressing cybersecurity: national security, economics, and public health. Harknett and Stever (2011) represent the national security focused approach to cybersecurity. Protection of critical infrastructure and defense of the nation are the key objectives of this approach. The national security paradigm emphasis is on traditional military concepts to strengthen protections for the networks to ensure that the government can continue to function in the face of a cyber-attack. Moore (2010) stresses the ability of economic incentives to improve cybersecurity. While largely focused on individual businesses, the ability of government to mandate breech disclosure and how it makes companies liable for failures in cybersecurity can shape how a nation secures its infrastructure. Remember 80% or more of the critical infrastructure is owned and operated by private firms. Finally, Mulligan and Schneider (2011) argue for a public health/public good approach to cybersecurity. If the Internet is truly a global commons, the steps taken to improve individual networks and computers provide a benefit for all. Should government require individuals to install anti-virus programs and take cybersecurity training to be able to plugin? The final readings in the section look at how other nations have approached cybersecurity. Baker (2014) provides a look at the issues in developing nations as they establish cyber policy. Not surprisingly several countries like the U.S. and U.K emphasize the national security aspects in their strategies but other countries such as Germany focus on the economic issues involved in cybersecurity. Where do nations concerned with content focus? As you review the paper, think about the countries you are familiar with and why they would focus on the issues they do. Finally, consider your company, industry, or profession. Why is it concerned with cybersecurity? Which tools should be emphasized? References Baker, E. W. (2014). A Model for the Impact of Cybersecurity Infrastructure on Economic Development in Emerging Economies: Evaluating the Contrasting Cases of India and Pakistan (Links to an external site.). Information Technology For Development, 20(2), 122-139. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=95593148&site=eds-live&scope=site China internet: Xi Jinping calls for “cyber sovereignty.” (Links to an external site.) (2015, Dec 16). Retrieved December 16, 2015, from http://www.bbc.com/news/world-asia-china-35109453 Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining cybersecurity. (Links to an external site.) Technology Innovation Management Review, 4(10), 13-21. Retrieved from http://vlib.excelsior.edu/login?url=http://search.proquest.com/docview/1638205509?accountid=134966 Harknett, R. J., & Stever, J. A. (2011). The New Policy World of Cybersecurity. (Links to an external site.)Public Administration Review, 71(3), 455-460. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=60467442&site=eds-live&scope=site Moore, T. (2010). The economics of cybersecurity: Principles and policy options. (Links to an external site.)International Journal Of Critical Infrastructure Protection, 3103-117. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edselp&AN=S1874548210000429&site=eds-live&scope=site Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for Cybersecurity. (Links to an external site.)Daedalus, 140(4), 70–92. Retrieved from http://vlib.excelsior.edu/login?url=http://search.proquest.com.vlib.excelsior.edu/docview/903303254?accountid=134966 To begin our module activities on “Approaches to Cybersecurity” let’s reflect on what cybersecurity means. What is important from your point of view for a cybersecurity policy? How would you define cybersecurity? Why? Keep these questions in mind as you continue on to your module activities.

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper