Emergency Management Perspectives on Cyber security

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  • QUESTION

     Emergency Management Perspectives on Cyber security   

    EDMG600 B001 Fall 2020
    Weeks 3-4 Written Assignment (submit here)

    Submit a single APA Formatted Paper (1500 word approximation). You must have an introduction and conclusion. Please use the APA Paper template attached.

    Part 1 of 2 (refer to Week 3 Readings in the Lessons for Week 3)

    Evaluate arguments by

    Clemente (2013)

    Department of Defense, Cyber Strategy (2018)

    FEMA (2013) CIPP

    Specifically, respond to the following questions:

    What issues are common?

    What are the differences is their assessment of cybersecurity and critical infrastructure protection?

    How does FEMA's Critical Infrastructure Protection Plan address key requirements set for by Clemente (2013)?

    Conclude with a research or policy question for further research.

    Part 2 of 2 (refer to Week 4 Readings in the Lessons for Week 4)

    Findings and Lessons Learned in Xia, Becerra-Fernandez, Gudi, & Rocha-Mier (2011)
    Information Fusion in Hennessy, Patterson & Lin (Eds.) (2003).
    Can these findings be utilized in your city, county, state EOC. Why? Why not?
    Conclude with a research or policy question.
    You must utilize literature and cite properly.
    Use APA style. Submit as Microsoft Word document.
    Name the single file "EDMG600Weeks3-4_YourLastName.doc/x" (e.g., EDMG600Weeks3-4_Pesic.doc/x).

    Weeks 3-4 Assignment

                Begin the paper with an introduction of your topic.  An introduction has an attention getter, purpose or thesis statement, and an overview.  An attention getter can begin with any of the  6 ways: (1) Anecdote, (2) Question, (3) Quotation,  (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html).  After you introduce the topic, state the purpose of the paper.  The purpose can be as simple as restating the objective of the assignment.  The purpose of this paper is to (state purpose).  (Overview) The paper will address the following: (List topics)

    Argument and Thesis

    Clement Cyber Security and Global Interdependence

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.

    Department of Defense Cyber Strategy

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.

    FEMA National Infrastructure Protection Plan

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.   

     

     

    Common Themes

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.

    Differences in Cybersecurity and Critical Infrastructure Assessment

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.

    FEMA's Critical Infrastructure Protection Strategy and Clemente Key Requirements

                Discuss and evaluate the arguments, themes, tenets and assertions.  Provide a detailed discussion and proved APA formatted citations.  Ensure your paragraphs are supported.

    Application of Knowledge Sharing Strategies and Information Fusion in the EOC

                (Describe the main points and tenets of the arguments).  This is the second main point as listed in the overview and pulled from the assignment.  It also ensures you address all points on the scoring rubric.  Please provide example to support your research or assumptions.  Real world events, experiences, opinions based on research, conclusions based on research. Be sure to use in text citation (Author, 2014).

    Research or Policy Question for Further Research

                State a research or policy question.

     

     

    Conclusion

                Conclusions wrap up what you have been discussing in your paper. After moving from general to specific information in the introduction and body paragraphs, your conclusion should begin pulling back into more general information that restates the main points of your argument. Conclusions may also call for action or overview future possible research. The following outline may help you conclude your paper:

    In a general way,

    • Restate your topic and why it is important,
    • Restate your thesis/claim,
    • Address opposing viewpoints and explain why readers should align with your position,
    • Call for action or overview future research possibilities.

     

    References

    Bellovin, S. M., Bradner, S. O., Diffie, W, Landau, S. & Rexford, J. (2011). Can it really work? Problems with extending EINSTEIN 3 to critical infrastructure. Harvard National Security Journal. 3.1, pp. 1-38

    Clemente, D. (2013). Cyber security and global interdependence: What is critical? Programme Report. Retrieved from https://www.chathamhouse.org/publications/papers/view/189645#

    FEMA. (2013). National infrastructure protection plan. Retrieved from https://www.dhs.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdf

    Hennessy, J.L., Patterson, D.A, & Lin, H.S. (Eds.). (2003). Information technology for counterterrorism: Immediate actions and future possibilities. Retrieved from https://www.nap.edu/read/10640/

    Saadawi, T & Jordan, J. Jr. (Eds.). (2011). Cyber infrastructure protection. Carlisle Barracks: U.S. Army War College, Strategic Studies Institute

    Xia, W., Becerra-Fernandez, I., Gudi, A., & Rocha-Mier, J. (2011). Emergency management task complexity and knowledge-sharing strategies. Cutter IT Journal, 24(1), pp. 20-25

     

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]
Subject

Technology 

Pages 16 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

  1. Weeks 3-4 Assignment

    Can the world we live in today get more interconnected? Could the global village become any smaller? Regardless of our answers to these questions, it is true that the security of individuals and their countries will be an essential part of it. As the interconnections on a global scale become a common feature, the necessity to identify and define critical infrastructure gets even more acute. This paper aims to look at cybersecurity and why it is essential that critical infrastructure is identified and protected.

    Argument and Thesis

    The protection of critical infrastructure through legislations and cybersecurity ultimately makes the citizens of a country safer.

    Clement Cyber Security and Global Interdependence

    Clement advances the idea that interdependence in cyberspace presents challenges in the realm of cyber security. The writer admits that the interconnections that exist between sectors make it virtually impossible to effectively protect the critical infrastructures that exist within this cyberspace.

    The paper reiterates that this interdependence is seen through the often touted concept of globalisation. As a phenomenon, globalisation creates more interaction and connections between nations. What this means is that with closer connections between nations, cyber enabled critical infrastructure dependencies go beyond boarders of nations and become global (Clemente, 2013). A cyber security issues that is felt in Tokyo can affect people from all over the world. The paper explains all these notions through the lens of “critical infrastructure”. Globalisation leads to a more globalised infrastructure which are approached differently by various countries.

    The identified interdependencies make it very difficult to define defensive parameters. The paper assesses the security implications that are evident at the intersection between cyberspace and critical infrastructure. It is asserted that many countries import the critical infrastructure needed by their own societies. Even while digital interconnections lead to much more efficiency, the level of dependability also climbs, necessitating the virtue of resilience (Clemente, 2013). Solutions to these problems include the need to adapt to allow for flexibility and be ready to restructure departments, prioritize the ares that need immediate protection, incentivize to control and manage stakeholder behaviour and invest in resilience by protecting valuable dependencies.

    Department of Defense Cyber Strategy

    This strategy recognizes from the outset the vital role that the new cyber era has on the creation of opportunities but also the challenges that it brings to the country, in this case the United States. The strategy sees cyberspace as a competitive area in which the players involved attempt to outdo each other and every player has to adapt in order to survive.

    This strategy has its core as the participation in, and prevention of crimes that are done through the internet. The goal is to identify, expose and disrupt cyber activities that threaten the country and the capability of the country to use this information for the purpose of making strategic decisions that address the cyberspace (Hennessy, Patterson, & Lin, 2003). The strategy here is to not only develop domestic capacity to advance in terms of the advances in cyber space race but also ensure that the allies that align with the United States have expanded capacities for cyberspace operations.

    The strategic approach adopted has an overemphasis on what the role of cyberspace is in the conflicts that the United States engages in. It calls for an agile and lethal joint force that accelerates cyber capability development, promote innovation, and leverage automation and data analysis to improve effectiveness (Hennessy, Patterson, & Lin, 2003). The strategy also calls for strengthening alliances and attract new partnership. It also aims to reform the department and cultivate talent.

    FEMA National Infrastructure Protection Plan

    This article assesses how the critical infrastructure and key resources (CIKR’s) are susceptible to external attacks especially in case of catastrophes. These resources that include economic, transportation and energy differ in what they do and how they look. Public and private infrastructures are essential to the nation and in fact have a series of regulations that guide their protection.

    This paper uses the case study of Mason County to illustrate what is meant by critical infrastructure within a country. It involved interviewing the residents and firefighters to find out what they considered their most important infrastructure within the county. It then offers solutions to what is felt can be done to improve and protect the infrastructure. The paper presents ways through which Mason County can establish CIKR identification and mapping program. This, it says, can be done by needs assessment and situational analysis, stakeholder analysis and the securing of funding.

    Common Themes

    One of the first common themes in these readings is the sensitivity and critical nature of cyber information. It is generally accepted throughout the readings that cyber space is the new critical frontier that is essential to a nation. The ideas from Clement and the department of Defence strategy identity the critical role that cyber space play in the development of a nation. They also admit that even though there are advantages to these platforms, they are also full of challenges that may threaten the security and well-being of the country.

    The next theme is the theme of interconnectedness in a globalized world. The papers seem to admit that the phenomenon of cyber space has made the world more interconnected than before. Even while these interconnections make it easier to transact business, network and communicate and with people from all over the world, it also comes with its challenges (Bellovin et al. 2011). The papers suggest various problems associated with such interconnectedness for instance cybercrime, hacking to steal information, using information from the cyber space to plan and execute terrorist attacks

    Finally, how to solve some of the problems that emerge from the influence of cyber space also comes out as a theme. The papers seem to suggest rather urgently that immediate interventions are needed to detect and stop some of the problems seen in the cyber space (Clemente, 2013). The country needs measures to protect itself from system hacks and targets from countries who would want to steal information for their selfish interests. No wonder then that vital CIKR’s have to be identified in a formal way and protected.

    Differences in Cybersecurity and Critical Infrastructure Assessment

    While cybersecurity focuses on the security of the cyberspace and the virtual world, Critical Infrastructure Assessment aims to identify critical infrastructure with the aim of offering them protection (FEMA, 2013). For cybersecurity, cyberspace is a place that is in consistent need of getting secured because breaches are tried every minute. The dynamic nature of the security issues also demand that they are addressed with innovation and creativity. The infrastructure assessed using this strategy outlined ought to be protected from potential harm.

    Cybersecurity mainly deals with ways of responding to the attacks by cybercriminals (it is reactive) while Critical infrastructure assessment deals with disaster preparedness (it is proactive). Unlike the infrastructural assessment, the criminals in cybercrime are always in contact with what they want to breach. There is no physical distance between the crime and the item. This makes cyber space even more vulnerable than the physical infrastructure that can be physically assessed.

    FEMA's Critical Infrastructure Protection Strategy and Clemente Key Requirements

    Clemente provided some requirements in determining the critical infrastructure within that country. First, he talked about increasing complexity whereby he explained that most infrastructure now depend on cyberspace which has shown considerable complexity (Clemente, 2013). There are interconnections between CI and cyberspace that make the definition even more complex. Secondly, he talked of shared language. Shared language considers the terminological consistency and how shared understanding would enhance efficiency. This allows analysis of critical infrastructure to proceed from the largest to the smallest issues. Next, Clemente talked of prioritization which reinforces the fact that prioritizing key assets and resources is critical in CI.

    FEMA’s Critical Infrastructure Protection Strategy specifies the steps necessary towards the protection of critical infrastructure. It details the steps involved in the identification and mapping program in order to provide the needed protection. It begins from a needs assessment and situational analysis where efforts already taken and product imitations are discussed and agreed on (FEMA, 2013). A stakeholder analysis is then done to determine who would help with the project. Funding is then secured for the project.

    Application of Knowledge Sharing Strategies and Information Fusion in the EOC

    In every country, there are usually strategies to determine critical infrastructure and ultimately protect them from those who may want to destroy such structures. These structures can be defined within the cyber spaces or in the physical world. This need to define critical structures is borne out of the desire to protect countries, the people and these critical infrastructures. Addressing these problems in totality would mean that a systematic method is developed and parameters for specification of what constitutes a critical infrastructure developed (Bellovin et al. 2011). While the federal government stresses on a more confrontational attitude in dealing with breaches in form of cybercrime, FEMA on the other hand provides a systematic way of critically assessing and protection of critical infrastructure that may be targeted by enemies of the state.

     

    Conclusion

    The proliferation of cybercrime over the internet makes a case for the determination of critical infrastructure within a country. Critical infrastructure is found in the context of a system of an increasingly interconnected world. The interconnection is hailed as a success from the manner in which it has brought people together. However, the challenges it has presented in the process are diverse. These challenges have to be identified and addressed accordingly. Future generations will need better strategies of defining and protecting critical infrastructure. It is the glue that holds future economic, social and technological environments together.

     

     

     

     

     

References

    • Bellovin, S. M., Bradner, S. O., Diffie, W, Landau, S. & Rexford, J. (2011). Can it really work? Problems with extending EINSTEIN 3 to critical infrastructure. Harvard National Security Journal. 3.1, pp. 1-38

      Clemente, D. (2013). Cyber security and global interdependence: What is critical? Programme Report. Retrieved from https://www.chathamhouse.org/publications/papers/view/189645#

      FEMA. (2013). National infrastructure protection plan. Retrieved from https://www.dhs.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdf

      Hennessy, J.L., Patterson, D.A, & Lin, H.S. (Eds.). (2003). Information technology for counterterrorism: Immediate actions and future possibilities. Retrieved from https://www.nap.edu/read/10640/

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section][et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default"]
  • QUESTION

    Week 4 Discusssion    

    This is a discussion question that I need answered. I need the second portion of the questioned answered thoroughly, both bullet points. I have highlighted it in yellow to show that it is what I need answered. I need this r returned to me completed without any grammatical or punctual errors. The company that I want this question written about is Nissan Motor Corporation.

     

    Choose ONE of the following discussion question options to respond to:

    Using Adverse Conditions to a Company's Advantage

    • Chakravorti (2010) discusses four methods that corporate innovators use to turn adverse conditions to their advantage. Examine an organization of your choice and briefly discuss how the organization might use one of these methods.

    -OR-

    Assessing Risk and Reward

    • Using the company of your choice, identify an important and difficult decision that they faced. What were the most important risks and the most important rewards of the decision?
    • What data, analysis or perspective would you have used to help Sr. Management decide if the rewards outweighed the risks?
[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Business Pages 4 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

Assessing Risk and Reward

The Nissan Motor Company is one of the leading automobile makers in the world. The Japanese carmaker has primarily enjoyed a successful run, allowing it to enter various regional and international markets such as the United States. However, the changing business environment was not favorable to the company in 2019. Notably, the cooperation recorded losses amounting to 7.8%. The experience pushed the management into making tough decisions, requiring almost all of its North American workforce to go for unpaid leaves.

In late 2019, the company announced that the decline in sales necessitated a two-day unpaid leave for the North American workers. The stated days for the vacation were January 2 and 3rd    (Chicago Tribune, 2019).  Notably, this move was a crucial decision for the company because of its conflicting impacts. Whereas on the positive side, it could help the firm minimize expenses, it threatened to affect the public perception of the company regarding employee welfare.

The rewards for the decision involved cutting expenses by not paying the workers on leave, which eventually would translate into reduced expenses. Another reward was that the decision could allow the company to optimize performance by evaluating employee performances then developing new milestones. However, on the low side, the company risked affecting its public image and brand name, especially in the North American market. As per Chakravorti (2010), the way an organization treats its employees influences the firm's public perception. Thus, Nissan risked eliciting a negative public perception. With a distorted public image, the company could fail to revive its declining sales.

I would have advised the management of Nissan to utilize the Predictive Analytic perspective in determining the right decision to take. Ideally, the approach tries to predict what might happen in the future if particular decisions or actions are undertaken at the moment (Traymbak & Aggarwal, 2019). Looking at the situation at Nissan, the company needed to develop a goal such as increasing sales. After that, they would have made decisions aimed at realizing the set goal. In this regard, the predicted outcome could give the management an overview of whether more risks existed or significant rewards could be realized.

.

References

 

  • Levite A & Junghue, (2019, January 24) Chinese-American Relations in Cyberspace: Towards Collaboration or Confrontation. Retrieved from: https://carnegieendowment.org/2019/01/24/chinese-american-relations-in-cyberspace-toward-collaboration-or-confrontation-pub-78213

    Simola, J. (2020). Privacy issues and critical infrastructure protection. In Emerging Cyber Threats and Cognitive Vulnerabilities (pp. 197-226). Academic Press.

     

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]