Week 8 Discussion – Regulation vs Innovation For your initial post, discuss the

Week 8 Discussion – Regulation vs Innovation For your initial post, discuss the topics below. Respond to posts from other students. Law and Regulation vs Innovation – a. Examine and describe in your own words at least 3 US government regulations that can compel business organization to manage their cybersecurity at a certain level. Why are these regulations necessary? b. Examine and describe in your own words possible conflicts between government regulation for cybersecurity and technology innovation. Which US industries are now falling behind similar technology industries in other countries because strong US government regulations may be slowing down US innovation? Describe the technology products that are affected by regulation. Background Sources • Wk 8 – Towards an Economic Framework for Network Neutrality Regulation.pdf Towards an Economic Framework for Network Neutrality Regulation (source) • Wk 8 – Complexity Innovation and the Regulation of Modern Financial Markets.pdf Complexity, Innovation and the Regulation of Modern Financial Markets (source) • Wk 8 – Taking the Long View on Competition and the Mobile Employee.pdf Taking the Long View on Competition and the Mobile Employee: Lessons from the United States History of Efforts to Regulate Employee Innovation and the Mobility of Workplace Knowledge (source) This discussion supports the course objective to compare and contrast the policies, practices, perspectives and products from various disciplines required to address national and global cyberthreats. NOTE: 300 or more Words count. References and Citations APA 7th edition format Week 9 Discussion – Cyber Weapons For your initial post, discuss all three topics below. Respond to posts from other students. Zero-Day exploits and Cyber Weapons a. Analyze the significance of the STUXNET malicious code events in Iran, and the significance of the Dragonfly malicious code currently found in the US and Europe (Do not dwell on describing the effects, instead describe the significance). b. Analyze the effects of the global market for sale of ZDEs. Can the proliferation of ZDEs and cyberweapons be controlled or managed by a treaty similar to the Nuclear Non-proliferation Treaty? Is it possible to keep a count of cyber weapons the same way we can monitor nations to count their nuclear weapons? Explain your answer. c. Describe the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy. Compare those characteristics and effects on computers to the traditional effects that are commonly associated with a malicious code cyberattack. Look up the costs for various commercial EMP devices found for sale on the Internet. Background Sources • Wk 9 – Loving the Cyber Bomb.pdf Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy (source) • Wk 9 – Understanding Technologies of Terror.pdf Understanding Technologies of Terror (source) • Wk 9 – Clash of Interpretations.pdf Clash of Interpretations: Cyberattacks as Weapons of Mass Destruction (source) • Wk 9 – Making Good Cybersecurity Law and Policy.pdf Making Good Cybersecurity Law and Policy: How Can We Get Tasty Sausage? (source) This discussion supports the course objective to appraise the cybersecurity related risk and vulnerability of various critical infrastructures, and to design strategies to discover and detect cyberattacks, cyberwarfare, and cyberterrorism. NOTE: 300 or more Words count. References and Citations APA 7th edition format

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount