Write a 6-8 page (1250-2000 words) essay, answering this prompt: You are invited to a Congressional hearing to present your action plan for the protection of public space from cyber-security threats. Discuss.
Intended audience: U.S. policymakers. They have some knowledge of the topic, but rely on you, as the expert, to explain the issues, frame the problem, and provide solutions to the problem.
Must use atleast five references attached.
Tip : Learning Objectives for the course :module 1-3
By the end of this module, students will be able to:
Module 1
- Define cybersecurity and its key components
- Analyze key cyber vulnerabilities, threats and producers of insecurity
- Explore how states can defend from cyber threatsIn this Module, we will revisit origins of the Internet architecture; find out about cyber security objectives of different architectures; and dive into the forms of user authentication and their applications.
Learning Objectives
Module 2
- By the end of this module, students will be able to:
- Understand origins of the Internet architecture
- Analyze cyber security objectives of different architectures
- Examine various forms of user authentication and their application
Overview
In this week, we will analyze key components of cyber deterrence and offensive attacks as well as understand US integration of these components into its security strategy.
Learning Objectives
By the end of this module, students will be able to:
- Examine key components, forms, goals and requirements for cyber deterrence
- Analyze military, intelligence and technical capabilities for cyber attack/defense
- Understand US cyber security doctrine regarding offensive/defensive cyber attacks


0 comments