Question
Background Industrial Revolution (IR) 4.0 would have an impact not just on industrial production but also on our everyday lives. The internet has enabled global
Background Industrial Revolution (IR) 4.0 would have an impact not just on industrial production but also on our everyday lives. The internet has enabled global communities to form and ideas and resources to be shared more easily. More organizations become dependent on the use of the Internet, intranets, and extranets in computing and telecommunications to remain competitive in domestic and global markets. Nevertheless, the use of the Internet in this interconnected world has several consequences on cyber governance policymaking. Cyber threats are evolving and increasing at a fast pace. These threats are initiated by criminal actors but they also come from foreign countries and political groups and may have other motivations than money-making, such as some types of "hacktivism" (Anonymous), destabilization (Estonia in 2007), cyber espionage, and sabotage (e.g. Colonial Pipeline Ransomware Attack in the USA, Unprecedented Hack of Ukraine's Power). Governance, strategies, and policies are crucial to reducing cybersecurity risks. They recognize that governments and companies are relying on the Internet to run their businesses and services. Most strategies aim to enhance governmental co-ordination at policy and operational levels. They reinforce public-private co-operation. They emphasize the need to respect fundamental values such as privacy, freedom of speech, and the free flow of information. All-new strategies are becoming integrated and comprehensive. One of the strategies was developed by the National Institute of Standards and Technology (NIST)1 of the U.S. Department of Commerce. The NIST Cybersecurity Framework (see the link below), provides private organizations and government sectors with a structure for assessing and improving their ability to identify, protect, detect, respond and recover (five functions) to cyber incidents. Your organization plans to adopt the NIST Framework as recommended by Cyber Security Malaysia (CSM) and your Chief Information Security Officer (CISO) requires you, a senior law enforcement officer to assess the framework in achieving the five functions and to use the framework in establishing or improving cyber security programs at your organization.
QUESTION
Questions:
Prepare ONE (1) report which must include the following:
a) Assessment of the existing framework on its ability to achieve the 5 functions (identify, protect, detect, respond and recover) to contain cyber incidents, showing the logic and justification for your reasoning
b) Propose the steps/phases to establish or improve cyber security program using the framework.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started