• Home
  • Blog
  • EMM 306 Building Cybersecurity Awareness Essay

EMM 306 Building Cybersecurity Awareness Essay

0 comments

EMM 306 Building Cybersecurity Awareness Essay

EMM 306 Building Cybersecurity Awareness Essay

ORDER NOW FOR CUSTOMIZED AND ORIGINAL ESSAY PAPERS 

Use the “Cybersecurity Timeline” as well as the assigned readings and three scholarly sources from the GCU library to assist you in completing this essay. Address the following prompts in your essay (750-1,000 words): EMM 306 Building Cybersecurity Awareness Essay

  1. Briefly explain the history of cyber security and its purpose in Emergency Management and Homeland Security. How did current cybersecurity measures come to be? Explain possible solutions to cybersecurity issues, including cybersecurity insurance protection. For instance, should the business or the government ever consider paying ransom, etc. to get their systems up and running again?
  1. Next, review your recommendations from Topic 3 Worksheet. In this section of the essay, add cybersecurity measures to your recommendations from your Topic 3 Worksheet.
  2. Lastly, recommend continuity planning & recovery for a possible cybersecurity attack on the stadium in Anytown.

Prepare this assignment according to the guidelines found in the APA Style Guide

Stadium

mail?url=https%3A%2F%2Flc.gcumedia.com%2Femm600%2Fevacuation plan%2Fv2.1%2Fbuild%2Fdefault%2Fsrc%2Fassets%2Fbuilding images%2Fstadium.jpg&t=1627924132&ymreqid=a2c930af 7aa7 b784 2f2c 5a003301e000&sig=IRzaiIOowOcqKz7

Information

  • Built in 1980
  • 50,000 available occupancy
  • Concrete structure, open air
  • Vender loading zones, VIP suites, Locker rooms, Security office
  • Communications: satellite, land lines, radio frequency
  • Concrete structure
  • Finished Basement used for VIP parking

Read “Stalking the Wily Hacker” by Stoll from Communications of the ACM (1988).

URL:

https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aci&AN=501990862&site=eds-live&scope=site

Read” The Case for Disappearing Cyber Security,” by Dykstra & Spafford from Communications of the ACM (2018).

URL:

https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=130478720&site=eds-live&scope=site

Access and view the “Cybersecurity” media piece to assist you in completing assignments.

URL:

https://lc.gcumedia.com/mediaElements/gcu-sequence-application/v3.1/#/showcase/sequence/34/view

Read “Corporate Solutions to Minimize Expenses from Cyber Security Attacks in the United States” by Krishan from Journal of Internet Law (2018).

URL:

https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aci&AN=131103585&site=eds-live&scope=site

Read “Assessing and Improving the Trustworthiness of Social Media for Emergency Management: A Literature Review” by Hiltz & Gonzalez, from Norwegian Information Security Conference / Norsk Informasjonssikkerhetskonferanse (2012).

URL:

https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=aci&AN=83305791&site=eds-live&scope=site

Read “Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” from WhiteHouse.gov website.

URL:

https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

Read “Great Rivalries in Cybersecurity: Cliff Stoll vs. Markus Hess” from cybersecuritymastersdegree.org (n.d.)

URL:

https://www.cybersecuritymastersdegree.org/cliff-stoll-vs-markus-hess/

1attachments

Slide 1 of 1

  • open in full 24px minwordattachment_1attachment_1open in full 24px min

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}