Discuss the vulnerabilities in the cyber security
Evaluation of the Global Impact of the Georgia/Estonia Cyber Event
Assess and evaluate the global impact of the Georgia/Estonia Cyber Event based upon the application of ethical policies, security practices, theories, and principles. In the report, apply cybersecurity policy, laws, regulations and global concepts to your analysis.
Security Practices, Information literacy/Research skills
Problem solving, Global impact of a Cyber Event
Each student will evaluate the global impact of the coordinated cyber attack directed against either (A) Georgia, OR (B) Estonia. Each student will write a 10-15 page policy brief about the country that was attacked, detailing the best policy and security practices to mitigate the effects from possible future coordinated cyber attacks. If you have any questions, please ask them early in the week so you have enough time to complete this assignment on time.
Students are to
1. Choose a single country (Georgia or Estonia) and discuss only that one country.
2. Students must use sub-headings in their report , including for the Introduction and Reference List.
3. Each report must include discussion of the following topics under Sub-headings
A. Identify and discuss the vulnerabilities in the cyber security practices and policies at the time of either the event in Georgia, or the event in Estonia, and the global impact resulting from that one particular event. Write about the cyberattack event reported in the media for only one country – either Georgia or Estonia (hereinafter called the “Georgia/Estonia” cyber event).
B. Discuss the alternatives, including possible advantages and disadvantages for reducing each named vulnerability and for improving each named security practice or policy, in order to mitigate future cyber events.
C. How should these changes be rolled out or implemented by the national government?
4. Do not include discussion about powers of a theoretical “Cyber Czar”.
5. The report should be 10-15 pages. (The reference list is outside of the page limit.)
Support your position with policy, security practice, theories, principles and recommendations based on your own thoughts, examples and cited references.
The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. References are NOT included in the page count. Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report.