W2: Critical Infrastructures Week 2 Discussion For your initial post, discuss all topics below. Respond to posts from other students Critical Infrastructures – a. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect traditional corporate office systems – why should there be a difference in priority order for Confidentiality, Integrity, and Availability? View the suggested background sources below. b. Discuss and compare security policy issues for Electric utilities, Oil Gas pipelines, traditional banking and alternative currencies, such as Bitcoin. Use the Internet to find some examples for recent cybersecurity issues seen by these industries. Background Sources • Wk 2 – Critical Infrastructures What makes an Infrastructure Critical.pdf • Critical Infrastructures: What Makes an Infrastructure Critical? (source) • Wk 2 – Power of Natural Gas Pipelines The Emergence of a National Gas Grid.pdf • Power of Natural Gas Pipelines: The Emergence of a National Gas Grid (source) This discussion supports the Course Objective to appraise the cybersecurity related risk and vulnerability of various critical infrastructures. W3: Cybersecurity Policy Design Issues Week 3 Discussion – Cybersecurity Policy Design Issues For your initial post, discuss the topics below. Respond to posts by other students a. Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls, Biometric Authentication) and explain why business also may have a cybersecurity responsibility to protect national security through business resilience and Continuity of Operations Planning b. Describe what is meant by the term “Cascade Failures” as it may apply to cyberattacks against critical infrastructures. Do you agree or disagree that businesses should protect national security by expanding their cybersecurity budget to prevent or reduce the effects of possible Cascade Failures that may affect their business and other downstream businesses that may depend on them? Justify your answer. Background Sources • WK 3 – Cyber Warfare Law and Policy Proposals.pdf Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance (source) • Wk 3 – 10 Conservative Principles for Cybersecurity Policy.pdf 10 Conservative Principles for Cybersecurity Policy (source) This discussion supports the course objective for comparing policies and practices from various disciplines required to address national and global cyberthreats.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount