Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Section A (refer to Week 1 Readings) Title each response with the text of each question)Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the PART 1 Reading List.Wh

Section A (refer to Week 1 Readings) Title each response with the text of each question)Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the PART 1 Reading List.What are the strengths and weaknesses of each? What is the most and lest persuasive premise, claim or rebuttal?Conclude with a research or policy question for further researchYou must use literature and cite properly. Use  style.   Section B (title each response with the text of each question)Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not?Conclude with a research question  policy question for further research.You must -use (cite, reference, list) required Week 2 Readings.  Week 2 Reading AssignmentRequired: Rollings, J. & Henning, A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service.Required: Fischer, E. A. (2012). Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions. Washington, DC: U.S. Library of Congress, Congressional Research Service.Required:  The White House (2011).The Comprehensive National Cybersecurity Initiative. Washington, D.C. Required: The White House (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. Washington, DC: The White House (please be patient when downloading. It may take up to five minutes to download the document).Required: Department of Homeland Security (2011). Blueprint for a Secure Cyber Future.Electronic Frontier Foundation, To the White House Cyber Security Review Team.The White House (2009). Cyberspace Policy Review.The White House (2011). National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy. Washington, D.C.Federal Reserve Bank of Dallas (2003). Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System.  United States. Government Accountability Office (GAO) (2011). Information security: Additional guidance needed to address cloud computing concerns. Internet Security Alliance (2008). The Cyber Security Social Contract Policy Recommendations for the Obama Administrations and 111 Congress.Owens, W. A., Dam, K. W. & Lin, H. S. (Eds.) (2009). Technology, policy, law, and ethics regarding U.S. acquisition and use of cyber attack capabilities. National Research Council. Committee on Offensive Information Warfare. The National Academies Press. Committee on Deterring Cyberattacks, National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.National Research Council (2009). Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World. Brecht, L. A. (2009). National cyber systems infrastructure security review concept paper. Capital Markets Research. 

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question