Summary of the Case Study: A Business Owner Seeks an Alternative to Seven-Day Workweeks

Business case studys:
A Business Owner Seeks an Alternative to Seven-Day Workweeks https://wilmu.instructure.com/courses/58533/files/9086338?wrap=1
Write a summary of the case study. Research and describe at least 3 technologies that could be used to support or enhance the business in the case study. Your paper should include at least 3 references from peer-reviewed journals associated with how other companies are using the 3 technologies you are recommending.

 

 

National Security Strategy and Cybersecurity

The chief technology officer (CTO) has indicated that your organization has been requested by the National Security Council (NSC) to comment on the upcoming National Cybersecurity Strategy. The NSC has asked for specific recommendations as it relates to the next cybersecurity strategy, private/public partnerships, and comments on how specific technologies should be incorporated into the assessment.

The CTO has asked you to collaborate with your team to provide the organizational input.

Use the ‘Cybersecurity Strategy, Law, and Policy Team Assignment Template’ to write your paper, which should cover the following topics:

Part 1: National Security Strategy and Cybersecurity

After reading the “National Security Strategy (2017)”, comment on the following.
Should the United States create a separate cybersecurity strategy to be published alongside the National Security Strategy (NSS), or do you feel the NSS is sufficient? Why or why not?
Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity?
Part 2: Public/Private Partnerships

After reading the “Cybersecurity Act of 2015”, address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.
What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers’ private data?
The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?

 

 

 

The availability of historic USGS topographic maps in digital formats

If all of the historic USGS topographic map products are available digitally and in easily accessible formats that can be used on a desktop, laptop, or tablet, is there still a need to have printed copies (at a variety of map scales) on hand? Keeping in mind that the topographic mapping program ran through 1992 and only a small percentage of the maps were updated after that (and the estimated median date for the currentness of a map was 1979), are the available printed maps up to date enough to be of use? Do surveyors, geologists, botanists, archeologists—or any other professionals who require topographic information for fieldwork—need to carry printed topo quads with them? Is there a need for geographers to have printed versions of several quads when seamless digital copies (which can be examined side by side) are so readily available? Are there situations in which a printed topo map is necessary?

So not exceed one page, can be shorter. Use short simple phrases without complex vocabulary.  If necessary use only one source.

Report of the Data Breach Incident – Marriott International Data Breach (2018)

Topic:
Find some data breach/security incident (from 2015 – present) that interests you. For example, if you like gaming, find data breach incidents in the gaming industry. If you’re interested in accounting, find data breach incidents in accounting, financial, and banking industries.
Do not limit to only US companies. You should expand the search.
*Note: Enron has nothing to do with data breach! If you turn in a paper that has nothing relates to cybersecurity, you will earn zero credit. Someone lost a laptop or made a mistake is not a “data breach incident”.

What should be in the project? The following is an example (Equifax) Equifax Data Breach Example.pdf, but do not limit yourself.
Part 1: Report of the incident (30% of the project/grading) (3 pages)

The company – short description of the company (no need to mention “players” like in the example)
Instruments – what kind of attack, tactics, methods
The events – exactly what happened
Outcomes – aftermath
Part 2: Shown what you have learned (45% of the project/grading) (7- 9 pages)

Ethics analysis – here is your own input and analysis on what the company should have done ethically
Recommendations – here is your recommendations in 1) policy, 2) technological, and 3) organizational point of view, etc.
Conclusion – what have you learned from it