Choose one of the following three policies related to health care reform that influences the economy: (NUMBER 3 IS THE ONE YOU ARE USING) Individual Mandate Cost-Sharing Reduction Payments to Insurer

Module 1 - Case

INTRO TO CYBERSECURITY AND TECHNOLOGY

Case Assignment

With computers and smart phones everywhere and connected, cyber continues to be an important part of private, public, and commercial concern.  Everything reachable through the Internet can be considered at risk.  As the computer age came about, so did the importance of cybersecurity.  Since nearly every system is now connected to the Internet, so has the vulnerability for cybercrimes.  Technology innovation has resulted in improved tech devices, data, and mobile services.  These new services collect and analyze huge amounts of information from private and proprietary information to company secrets.  The continuation of the technology improvements creates a continued challenge to defend against hackers and thieves.  

For this case, answer the following:

1. Define cybersecurity.

2. Explain the different categories of basic cyber threats to a system.

3. Identify and discuss the actors, targets, methods, and impacts involved in cyber-attacks.

Assignment Expectations

Assignments should be 3-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

  • Relevance—All content is connected to the question.

  • Precision—Specific question is addressed. Statements, facts, and statistics are specific and accurate.

  • Depth of discussion—Present and integrate points that lead to deeper issues.

  • Breadth—Multiple perspectives and references, multiple issues/factors considered.

  • Evidence—Points are well-supported with facts, statistics and references.

  • Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.

  • Clarity—Writing is concise, understandable, and contains sufficient detail or examples.

  • Objectivity—Avoids use of first person and subjective bias.

  • References—Sources are listed at the end of the paper.

Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).

Module 1 - SLP

INTRO TO CYBERSECURITY AND TECHNOLOGY

Costs to defend against cyber threats continue to grow as losses mount from cybercrime.  Examples of these crimes include retailers such as Target and Home Depot with the loss credit card information, to Sony related loss of company secrets on film releases, and to the US Government, with millions of government employee’s personal data breached.   Cybercrime is now an everyday occurrence and estimated annual costs due to these acts have soared into the hundreds of billions of dollars. 

For this SLP, answer the following:

  1. What are some estimates on the cost of cybercrime to individuals, businesses, and the governments? 

  2. Describe some significant cybercrime examples (at least one to a government, business and individual).  Comment on the actor, target, methods and resulting impact. 

SLP Assignment Expectations

Assignments should be 3-5 full pages, double-spaced, not counting the cover or reference page. Paper format: (a) Cover page, (b) Header, (c) Body. Submit your assignment by the last day of this module. Provide quotations to support your responses.

  • Relevance—All content is connected to the question.

  • Precision—Specific question is addressed. Statements, facts, and statistics are specific and accurate.

  • Depth of discussion—Present and integrate points that lead to deeper issues.

  • Breadth—Multiple perspectives and references, multiple issues/factors considered.

  • Evidence—Points are well-supported with facts, statistics and references.

  • Logic—Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.

  • Clarity—Writing is concise, understandable, and contains sufficient detail or examples.

  • Objectivity—Avoids use of first person and subjective bias.

  • References—Sources are listed at the end of the paper.

Use strong credible sources – peer-reviewed references, government documents, and subject matter expert materials to support your answer. Your paper will not exceed 5 pages (excluding cover sheet and reference page(s).


Required Reading

Bakjhi, S. (2013, May 6). 25 Biggest cyber-attacks In history. Retrieved from http://list25.com/25-biggest-cyber-attacks-in-history/1/

Intel (2014), Net losses: Estimating the global cost of cybercrime - Economic impact of cybercrime II, Intel Center for Strategic and International Studies. Retrieved from 
https://create.org/wp-content/uploads/2014/06/rp-economic-impact-cybercrime2.pdf

Read Chapter 1, What is Computer Security? in:
Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2016). Security in computing, 5th Ed. Prentice Hall. Retrieved from 
https://ahsanghazi.files.wordpress.com/2017/03/263973122-security-in-computing-5-e-charles-p-pfleeger-pdf1.pdf

Pomerleau, M. (2015, June 10). How might the US respond to cyber-attacks? Retrieved from 
https://defensesystems.com/Articles/2015/06/10/US-response-scenario-cyber-attack.aspx 

Pomerleau, M. (2015, Sep 30). Intelligence officials: Cyber domain is still the 'Wild West.' Retrieved from https://defensesystems.com/articles/2015/09/30/ic-congress-cyber-wild-west.aspx

Required Websites

Surfwatch. Cyber Risk Intelligence. Retrieved from https://www.surfwatchlabs.com/threat-categories#Actor

Optional Reading

Levin A., & Ilkina D. (2013). International Comparison of Cyber Crime. Retrieved from 
http://www.ryerson.ca/tedrogersschool/privacy/documents/Ryerson_International_Comparison_ofCyber_Crime_-March2013.pdf

Ferbrache, D. (2016). How vulnerable are governments to cybercrime? KPMG. Retrieved from https://home.kpmg.com/xx/en/home/insights/2016/05/how-vulnerable-are-governments-to-cyber-crime.html