Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the PART 1 Reading List.
What are the strengths and weaknesses of each?
What is the most and lest persuasive premise claim or rebuttal?
Conclude with a research or policy question for further research
You must use literature and cite properly. Use APA style.
Section B (title each response with the text of each question)
Has U.S. federal government developed a robust legal regulatory and policy framework to address cyber security challenges? Why? Why not?
Conclude with a research question or policy question for further research.
You must APA-use (cite reference list) required Week 2 Readings.
Week 2 Reading Assignment
Required: Rollings J. & Henning A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service.
Required: Fischer E. A. (2012). Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions. Washington DC: U.S. Library of Congress Congressional Research Service.
Required: The White House (2011).The Comprehensive National Cybersecurity Initiative. Washington D.C.
Required: The White House (2011). International Strategy for Cyberspace: Prosperity Security and Openness in a Networked World. Washington DC: The White House (please be patient when downloading. It may take up to five minutes to download the document).
Required: Department of Homeland Security (2011). Blueprint for a Secure Cyber Future.
Electronic Frontier Foundation To the White House Cyber Security Review Team.
The White House (2009). Cyberspace Policy Review.
The White House (2011). National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice Efficiency Security and Privacy. Washington D.C.
Federal Reserve Bank of Dallas (2003). Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System.
United States. Government Accountability Office (GAO) (2011). Information security: Additional guidance needed to address cloud computing concerns.
Internet Security Alliance (2008). The Cyber Security Social Contract Policy Recommendations for the Obama Administrations and 111th Congress.
Owens W. A. Dam K. W. & Lin H. S. (Eds.) (2009). Technology policy law and ethics regarding U.S. acquisition and use of cyber attack capabilities. National Research Council. Committee on Offensive Information Warfare. The National Academies Press.
Committee on Deterring Cyberattacks National Research Council (2010). Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.
National Research Council (2009). Beyond ‘Fortress America’: National Security Controls on Science and Technology in a Globalized World.
Brecht L. A. (2009). National cyber systems infrastructure security review concept paper. Capital Markets Research.