...Table of Contents Introduction 2 Meta-Data in the Retail Industry 2 Negative Aspects 3 What Should Lawmakers Do? 4 Goals of Lawmakers 5 Possible Outcomes of Cybersecurity Regulations 5 Conclusion 6 References 7 Introduction Meta-data can be described as ‘detailed data which describe other data to obtain a better understanding and achieve better quality of information’ (Beth Haugen, Herrin, Slivochka, McNeil Tolley, Warner, & Washington, 2013). Private companies harvest meta-data to create complex advertising campaigns (Yu, McLaughlin & Levy, 2014). We shall focus on the retail industry, and how companies use meta-data. We shall also discuss the cons if meta-data collection, the responsibility of lawmakers in regulating meta-data collection. Finally, we shall look at the possible effects of cybersecurity regulations of meta-data on the private industry. Meta-Data in the Retail Industry An example of a popular retail store is Target. Target’s goal is to make it the go-to store for all merchandise, by providing great value, innovation, excellent customer service by adhering to their ‘Expect More. Pay Less.’ promise (Target, 2015). Collecting meta-data about customers helps Target to achieve its goal by creating detailed clients profiles, accurate product suggestions, and a quicker online product search and checkout (Milian, 2014). Target uses meta-data from social media to address its innovation goal, by judging the consumers’ reactions to its designer partnerships...
Words: 1653 - Pages: 7
...Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies and procedures for private sectors. The executive branch...
Words: 1899 - Pages: 8
...Private and Public Sector Cybersecurity Needs George Gritten Table of Contents Executive Summary 3 Introduction 4 The Current State of Cybersecurity 4 The Evolution of Cybersecurity 7 Moving Towards a More Secure Tomorrow 9 Conclusion 10 References 11 Executive Summary Today’s world is quickly evolving into a world that relies solely on technology as a way to do business and communicate. With this move towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive...
Words: 2198 - Pages: 9
...6. Enter your library username and password. Download and read the following articles available in the ACM Digital Library: Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization. 2. Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three (3) examples. 3. Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise. Then, evaluate the required...
Words: 1615 - Pages: 7
...Government Intervening To Protect Our Cyberspace University of Maryland University College Table of Contents Introduction page…………………………………………………………………..3 Justification to Regulate Private Industry Cybersecurity………………………3-4 Real World Threat…………………………………………………………………4-5 Methods for Government Intervention:…………………………………….……5 Government’s Intervention Impacts on National Security………………….….5-6 Real World National Security Breaches…………………………………………6 Arguments of the Private Sector to Take Responsibility.................................6-7 Failure to Take Responsible Action................................................................7 Conclusion…………………………………………………………………………7-8 References.....................................................................................................8-9 Introduction In 1969, the first ever network was born into existence (ARPANET) also called advanced research projects agency network. The Government Defense Department worked diligently on this break through in order to link some of the United States most prominent research universities with a couple of purposes in mind:...
Words: 1747 - Pages: 7
...IA#1 Cybercrime Law, Regulation, Effects on Innovation John Doe CSEC 620 Section 9022 Note: This paper was submitted through originality check websites. Table of Contents 1. Introduction 3 2. Private Industry & Regulations 4 3. National Security Concerns 4 4. Methods 6 5. Impacts of Government Regulation 7 6. Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace and...
Words: 2894 - Pages: 12
...and private industries with various methods and motives behind them. Those various attack methods can make a significant damage ranging from an individual identity theft based scale to national scale concerning its security as a sovereign nation. In other words, cybercrime equally brings serious concerns for both private industries and government. Also, private industries have an interchangeable relationship with government agencies as client to provide services. Most of utilities-related critical infrastructure systems in every city are mostly managed by private organizations. As we are more depending on technological management of such critical infrastructure and centralization of such system throughout the network, cybercrime targeting those critical infrastructures can have detrimental effects for both private and government sectors. There has been a steady increase in numbers of cybercrime with its benefits over the traditional crime in the past decades. Cyber criminals are getting smarter and equipped with more resources with every passing days and are becoming bigger threats. Therefore, it is important to scrutinize those cybercrime-related issues as well as to delve into planning a well-thought out countermeasure for both private and government sectors in various aspects for betterment of safer society of the information era. In this paper, Part I addresses how government intervention justifies telling private industry how to set up or improve their cybersecurity with...
Words: 3978 - Pages: 16
...department as large as the DHS is unable to fully protect the homeland from every threat possible. There is no way to always cover every avenue for potential threat to the U.S. To combat this unfortunate reality, the DHS relies on help from private enterprise. The DHS includes an office, known as the Office of Policy, which includes the Private Sector Office as one of its sub-departments. The Private Sector Office provides the Secretary and Department leaders with advice on issues relevant to the private sector, including academia, non-profits, NGOs, and businesses (dhs.gov). In addition, the PSO helps create and foster strategic communications with the private sector to enhance the primary mission of the Department to protect the American homeland (dhs.gov). This paper will explain the involvement of the Department of Homeland Security with private enterprise via the PSO, explain why this involvement is crucial to the mission, and explain how the DHS uses private enterprise in the protection of critical infrastructure and key resources. This paper will also give examples of programs that address governments on all levels, private enterprises, or individuals in the DHS mission areas of Prevention, Response, and Recovery. The Private Sector Office has four major missions: * Engage individual businesses, trade associations and other non-governmental organizations to foster dialogue with the Department. * Advise the Secretary on prospective policies and regulations and...
Words: 1203 - Pages: 5
...URE , SAFE T Y, AN D E N VIRON ME N T PROGRAM Cybersecurity Economic Issues Corporate Approaches and Challenges to Decisionmaking RAND RESEARCH AREAS THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE C ybersecurity economics is an emerging field. There is a significant need for better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. In two articles, RAND senior scientist Shari Lawrence Pfleeger and her colleagues addressed these key cybersecurity concerns and identified how different types of companies or organizations perceive the importance of cybersecurity and make cybersecurity investment decisions. Abstract The emerging field of cybersecurity economics could benefit from better data, better understanding, and better methods for using resources wisely, not only to protect critical products and services but also to provide assurances that software will work as expected. This research brief presents findings that address these key cybersecurity concerns, perceptions of the importance of cybersecurity, and considerations for cybersecurity investment decisions. In particular, it suggests...
Words: 2167 - Pages: 9
...| January 30 2014 | Critically analyse the main global governance issues relating to the internet and discuss how well these issues are being addresses at a global level. Word count: 1,986 | Global Governance | The internet has massively changed the business world. The internet has given companies the opportunity to increase their output and improve their competitiveness. The internet has allowed a company to work outside its base. E.g. a company’s headquarters is based in the UK, but they have a call centre in India where wages are a lot lower. According to (Society 2013) the internet works and runs the way it does, not because of government instructions or the intergovernmental agreement, but because internet governance is comprehensive, transparent and collective. The internet allows innovation, exchange of information between counties and flow of ideas. Furthermore it encourages economic growth, in return contributing to social and economic development. The term ‘Internet governance’ is used in more context that one. It applies to activities such as; coordination of technical standards, development, operation of critical infrastructure legislation and regulation. The internet is not restricted to government activities. There are different types of stakeholders and each of them has a different role in defining and carrying out Internet governance. There is not one specific person, company, organisation or government that runs the internet. It is made...
Words: 2112 - Pages: 9
...CIS 502 Critical Infrastructure Protection Click Link Below To Buy: http://hwaid.com/shop/cis-502-critical-infrastructure-protection/ Due Week 6 and worth 50 points Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure. The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment. Write a three to five (3-5) page paper in which you: 1. Examine the Department of Homeland Security’s : a. mission b. operations c. responsibilities 2. Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets. 3. Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure. 4. Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure. 5. Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion. 6. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times...
Words: 1288 - Pages: 6
...Abstract: Advanced cyberattacks on the public and private sectors at the local, national, and international level have prompted an increase in funding and support for the study of emerging cybersecurity technologies. The considerations for this paper are to discuss the emerging technologies and strategies that can be integrated across the public and private sector to improve cybersecurity on a local, national, and international level. New technologies need to dynamically assess networks real-time such as with the use of Remote Agents and Real-time forensic analysis. These technologies also need to make the attack space less predictable and constantly evolving such as through the use of moving target defense. Emerging Cybersecurity Technologies The E-government Act of 2000 was signed by President Bush to move toward a more 24-7 government. The dream was to eliminate the need to have to stand in line at the DMV for half a day just to pay annual vehicle registration fees (Barker, 2011). Security was certainly a concern, but it was not at the forefront of the move as government agencies would go through massive changes in equipment, manning, and practices in order to move information and programs online. Now, over a decade later we still see moves and changes taking place, such as the department of Veterans Affairs recently moving all of their applications, forms and records online. The expensive cost of getting the government caught up was expected with such an overhaul...
Words: 2624 - Pages: 11
...electronic systems, information systems and space systems solutions. We will provide a brief overview of the current state of the defense contracting sector and the cyber security threats and policies that govern it. We will also examine the classes of data that the defense contractor must protect and the potential cyber defense technologies that could be implemented in a prioritized strategy to secure that information. This briefing will also provide the priorities for legal and policy compliance amongst Defense contractors. Because Hytema is a Defense contractor the organization must work closely with the Federal Government causing them to adopt many of their policies and regulations. The most strategic and informative policy is the Federal Information Security Management Act (FISMA). All departments and agencies are required to coordinate and cooperate with the Department of Homeland Security as it carries out its cybersecurity responsibility actives as noted in the Office of Management Budget (OMB) (Dhs.gov, 2015) 2. Social Importance 2.1 Effects on society of the sector Defense contractors contribute to a very large part of what is deemed as societal importance in today’s society, however they are often overshadowed. Defense contractors that work for the Department of Defense within the cyber technology sector take up almost eighty percent of the DoD staff (Defense.gov, 2015). The Department of Defense states that its main objective is not tanks, planes or...
Words: 1094 - Pages: 5
...Cybersecurity Standards: A Case Study on Malaysian Banking Sector Anwer Yusoff Head, Industry & Business Department CyberSecurity Malaysia Sept 18th 2013 Copyright © 2013 CyberSecurity Malaysia Internet use in Malaysia 17 ,723,000 internet users Sources: Internet World Stats (30 June 2012) Copyright © 2013 CyberSecurity Malaysia 2 Internet use in Malaysia The highest usage was recorded among people aged 20-24. almost 6 in 10 (57%) regularly use the internet. Malaysian internet users (aged 20-24) spend an average of 22.3 hours online per week 87.9% of Malaysians on the internet access Facebook Once online, Malaysian’s Top 3 activities 1. social networking sites 2. instant messaging 3. reading local news Source: The Nielsen Company (April 2011) Copyright © 2013 CyberSecurity Malaysia 3 HIGH LEVEL USAGE = HIGH RISK Copyright © 2013 CyberSecurity Malaysia 4 HIGH LEVEL USAGE = HIGH RISK Cyber Security Incidents (1997-2013) Reported to Cyber999 Help Centre 16,000 15,218 Type of incidents: 14,000 • • • • • • • • 12,000 10,000 8,000 As at 31st August 2013 Fraud and scams Intrusion and web defacement Destruction Denial-of-Service Virus / Malware Harassment Content-related Intrusion attempts 9,986 7753 8,090 6,000 3,566 4,000 2,123 2,000 81 196 1997 1998 527 347 1999 2000 860 625 2001 2002 ...
Words: 1957 - Pages: 8
...The Future of Cybersecurity LaToya Crook BCC/403 October 26, 2015 Professor David Pettinari The Future of Cybersecurity The world in which we live is becoming more socially connected than ever before. It seems that technological advances have met, if not exceeded, anyone's expectations as new ways to communicate continue to develop. Due to the innovations of mobile connections, global technologies, and the ominous cloud, information can be shared and accessed at the touch of a screen or the sound of one's voice. Digital equipment that were unheard of just five years ago now inundates both professional and personal arenas. As a result, organizations, as well as their employees, have begun to feel the pressure placed on them to address current and potential threats to the security of their systems and clients (CloudTweaks, 2013). Cybercriminals can retrieve and analyze information gained through technological access from a single business or entity and use such confidential data to give competitive advantages to other organizations, to satisfy the requests of influential individuals, or to benefit national security. The World Wide Web permits immediate and boundless communication and the ability to interface on a global level, which can have its downfalls just as much as its benefits. Unapproved access to, and abuse of, information, technology and fundamental systems can irreparably damage a person or organization’s character, financial status, sense of stability and...
Words: 1962 - Pages: 8