Cybersecurity Governance

Cybersecurity Governance

Step 8: Create Regional Fact Sheet on Identification and Implication of Cybersecurity Threats

To illustrate the impact of cybersecurity threats, develop a one-page fact sheet using one of the regions from your matrix. Explain the cybersecurity threat experienced in one region, the evolution of the associated malware, the implications (e.g., economic, political, national security, etc.) of it to that region and how global cybersecurity policies might be used to counter the effects.

You will discuss six specific characteristics (purpose, size, attack method, attribution, etc.) of the malware and describe how these characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss what contributing factors may cause these characteristics to change, and how these characteristics may change over the next 10 years. How might these technologies be countered by global cybersecurity policy controls (do not describe technology controls) in the future? Support your position with policy, security practice, theories, principles, and recommendations based on your own thoughts, examples, and cited references.

Submit your regional fact sheet for feedback.

Leave a Comment

Your email address will not be published. Required fields are marked *

Cybersecurity Governance

Cybersecurity Governance

Step 8: Create Regional Fact Sheet on Identification and Implication of Cybersecurity Threats

To illustrate the impact of cybersecurity threats, develop a one-page fact sheet using one of the regions from your matrix. Explain the cybersecurity threat experienced in one region, the evolution of the associated malware, the implications (e.g., economic, political, national security, etc.) of it to that region and how global cybersecurity policies might be used to counter the effects.

You will discuss six specific characteristics (purpose, size, attack method, attribution, etc.) of the malware and describe how these characteristics have emerged, changed, or evolved over the past five to 10 years. Also discuss what contributing factors may cause these characteristics to change, and how these characteristics may change over the next 10 years. How might these technologies be countered by global cybersecurity policy controls (do not describe technology controls) in the future? Support your position with policy, security practice, theories, principles, and recommendations based on your own thoughts, examples, and cited references.

Submit your regional fact sheet for feedback.

Leave a Comment

Your email address will not be published. Required fields are marked *

Cybersecurity Governance

Cybersecurity Governance

Step 7: Compile International Cybersecurity Environmental Scan Findings

Compile all of the information you found in the previous two steps and write a two-page summary. Use the International Cybersecurity Environmental Scan Template to guide your summary, which should include descriptions of the regions and of the cybersecurity threats prevalent in the regions selected. Address the role of international bodies (NATO and United Nations) in influencing and contributing to international cybersecurity policies.

Submit your summary for feedback. This summary will be included in your final report.

Leave a Comment

Your email address will not be published. Required fields are marked *

Cybersecurity Governance

Cybersecurity Governance

 

Project 6: Global Approaches to Cybersecurity
Step 6: Review NATO and United Nations

Complete the Andrew Bowers NATO Intern eLearning Module for an overview of the NATO cybersecurity stance. NOTE: To view some modules in this project, Flash must be enabled in your browser. A quick internet search for “enable flash” in IE, Edge, Chrome, Firefox, or Safari will yield instructions if you need them.

Evaluate its effectiveness as well as the effectiveness of the United Nations cybersecurity stance in helping to contribute to cybersecurity international policy over the next decade. For more information, read about international cybersecurity approaches.

Update the International Cybersecurity Threat Matrix from the previous step, based on your findings in this step. Submit your matrix for feedback. This matrix will be included in your final report.

 

 

Step 5: Review International Cybersecurity Threats

Due to the vast differences in culture, leadership, laws, and policies of countries around the globe, cybersecurity threats are handled differently. These differences result in various approaches to cybersecurity economic issues, different tolerances for cybersecurity cultural issues, and different responses to cyberterrorism. Ultimately, global perspectives on international cybersecurity legal issues have broad impact as different nations attempt to both thrive in the global economic environment and survive in light of global cyberthreats. Organizations that desire to expand into foreign nations must consider these differences, particularly when they are not relevant when operating in the United States.

For this step, you will evaluate global cybersecurity threats coming from a minimum of three different regions; for example, the Middle East, Europe, Africa, Russia, or other regions. More specifically, think about networked computing systems being critical to businesses, commerce, education, and governments. Keeping them secure is no longer solely the concern of corporate entities and the relevant regulatory environments. Global governments must also work to ensure the security of their networks. Also consider your selected technology from the previous step.

Complete the International Cybersecurity Threat Matrix for at least three countries or regions, aside from the United States and North America.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top