Topic 1: Critical Components of Global Cybersecurity
A. What are the critical components of a responsible cybersecurity policy from a
This would be up for debate since different countries attach different meanings to the
CSEC610 - Individual Assignment
Objective: Assess the vulnerabilities of an organizations hardware and
software systems, transmission media, local area networks, wide area
networks, enterprise networks, Intranets, and its use of the Internet to
A. Focusing on the healthcare products and services sector, what business processes do
you regard as having been dramatically impacted by B2B (or B2G) e-commerce?
E-commerce has change the healthcare landscape and tilt it to a whole new direction. Away
Topic 4: Challenges for Cyber Law
A. What is the biggest challenge in the development of cyber law?
The biggest challenge in the development of cyber law is the concept of jurisdiction Jurisdiction
poses a big challenge to developing cyber laws because th
A. Select and discuss one special step necessary upon arriving at a potential crime,
scene to preserve stored information in volatile media?
Arriving at a non-computer or technological crime scene procedures do differ with a crime that
has to do with the
Topic 1 Key Elements of SBI-NET (Secure Border Initiative-Network)
A. Compare and contrast the key elements of the SBI-NET project in light of
its cost, failures & successes.
In November 2005, the Department of Homeland Security (DHS) established the
Topic 1 Russian Culture
A. What are some unique characteristics of the Russian culture that make
cyberspace issues more challenging?
Russia has been sponsoring systematic cyber espionage in Europe, the United States and
Asia for several years. Russias
Topic 1 - Ethical Assessment
Discuss the ethics associated with Future Global Cyber Security
Issues. Specifically discuss the ethical issues associated with the
implementation of global cybersecurity policy and the
interconnectedness of cyber security to
Topic 1 Characteristics of Clausewitzs Theory of Warfare
A. Compare and contrast the key characteristics of Clausewitzs theory of warfare.
Clausewitzs theory of war offers surprising predictive insight into the dynamics of
information operation within the
Topic 1 Changing Nature of Cyber Warfare
A. How has the nature of cyber warfare changed in the past 5 years from an
economic, social and government perspective?
At least over 140 countries are developing cyber weapons, and the number of cyber
A. Outline a set of roles and responsibilities for a typical CISO.
The roles and responsibilities of a Chief Information Security Officer (CISO) are usually challenging. A
CISO roles and responsibilities cut through every fabric or section of an organizat