Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background Industrial Revolution (IR) 4.0 would have an impact not just on industrial production but also on our everyday lives. The internet has enabled global

Background Industrial Revolution (IR) 4.0 would have an impact not just on industrial production but also on our everyday lives. The internet has enabled global communities to form and ideas and resources to be shared more easily. More organizations become dependent on the use of the Internet, intranets, and extranets in computing and telecommunications to remain competitive in domestic and global markets. Nevertheless, the use of the Internet in this interconnected world has several consequences on cyber governance policymaking. Cyber threats are evolving and increasing at a fast pace. These threats are initiated by criminal actors but they also come from foreign countries and political groups and may have other motivations than money-making, such as some types of "hacktivism" (Anonymous), destabilization (Estonia in 2007), cyber espionage, and sabotage (e.g. Colonial Pipeline Ransomware Attack in the USA, Unprecedented Hack of Ukraine's Power). Governance, strategies, and policies are crucial to reducing cybersecurity risks. They recognize that governments and companies are relying on the Internet to run their businesses and services. Most strategies aim to enhance governmental co-ordination at policy and operational levels. They reinforce public-private co-operation. They emphasize the need to respect fundamental values such as privacy, freedom of speech, and the free flow of information. All-new strategies are becoming integrated and comprehensive. One of the strategies was developed by the National Institute of Standards and Technology (NIST)1 of the U.S. Department of Commerce. The NIST Cybersecurity Framework (see the link below), provides private organizations and government sectors with a structure for assessing and improving their ability to identify, protect, detect, respond and recover (five functions) to cyber incidents. Your organization plans to adopt the NIST Framework as recommended by Cyber Security Malaysia (CSM) and your Chief Information Security Officer (CISO) requires you, a senior law enforcement officer to assess the framework in achieving the five functions and to use the framework in establishing or improving cyber security programs at your organization.

QUESTION

Questions:

Prepare ONE (1) report which must include the following:

a) Assessment of the existing framework on its ability to achieve the 5 functions (identify, protect, detect, respond and recover) to contain cyber incidents, showing the logic and justification for your reasoning

b) Propose the steps/phases to establish or improve cyber security program using the framework.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Tort Law Text Cases And Materials

Authors: Jenny Steele

5th Edition

0198853912, 978-0198853916

More Books

Students also viewed these Law questions

Question

What made you decide on this subfield of psychology?

Answered: 1 week ago

Question

Pay him, do not wait until I sign

Answered: 1 week ago

Question

Speak clearly and distinctly with moderate energy

Answered: 1 week ago