ITS 415 CSU Security and Encryption Policies of US Discussion

Question Description

Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission.

Option #1: Security and Encryption Policies

Read the following case study available through ProQuest (CSU Global Library (Links to an external site.)):

Chinese National pleads guilty to conspiring to hack into US Defense Contractors’ systems to steal sensitive military information (Links to an external site.). (2016, March). US Fed News Service, Including US State News.

Answer the following questions in your paper:

  1. What strategic recommendations would you make?
  2. What operational security aspects should be considered to prevent such attacks in the future?
  3. What sort of an encryption policy, if any, would have helped in this situation?

Your paper should meet the following requirements:

  • Be 1-2 pages in length, not including the cover page and reference page.
  • Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.
  • Support your answers with the readings from Module 5 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library’s homepage.

Option #2: Cyber Attack Case Study

Read the following case study available through ProQuest (CSU Global Library (Links to an external site.)):

Benyon, D. (2016, February). Cyber gets physical (Links to an external site.). Reactions.

Answer the following questions in your paper:

  1. Describe at least two other physical cyber-attacks.
  2. Could this type of attack affect our power grid, water supply, airline industry, nuclear plants, oil refineries and more?
  3. What preventative measures can be used?

Your paper should meet the following requirements:

  • Be 1-2 pages in length, not including the cover page and reference page.
  • Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.
  • Support your answers with the readings from Module 5 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.
  • Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library’s homepage.

Prof. Angela

4.6/5

Calculate Price


Price (USD)
$
Need Help? Reach us here via Whatsapp.