Digital Currency

 

 

 

As a recent graduate of the UMGC Master’s in Cybersecurity program, you have received a well-deserved promotion to chief information security officer (CISO) at the global financial institution where you work. The role is new for you and the company. It reports directly to the chief information officer (CIO), which for the purposes of this course, is the instructor. Much of what you will be doing in the next couple of months is centered around the policy aspects of the bank.
The CIO has lobbied for your role to be created as a result of four concerns that will require your expertise and focus. In general, you are told you will be addressing the following four projects:
• Mobile Device Management (MDM)
• Identity Theft
• Digital Currency
• Enterprise Policy
Now that you have an idea of the tasks ahead, the first project will be developing recommendations for mobile device management, which will include written comments and a presentation for the company’s leadership. This is the first of four sequential projects in this course and should be completed in about two weeks. There are 11 steps to complete in Project 1. Contact the CIO (your instructor) with any questions. Proceed to Step 1 to begin.
Competencies
Your work will be evaluated using the competencies listed below.
• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
• 2.4: Consider and analyze information in context to the issue or problem.
• 8.1: Report on current developments in cybersecurity management and policy.
Mobile Device Management Policy
As the chief information security officer for one of the largest global financial institutions, you are part of the company’s weekly executive meetings.
This week, the CEO starts the discussion with a statement: “I am constantly impressed with the stuff I can do on my cell phone and tablet. It’s amazing!…I am completely connected to all aspects of the business, as well as the outside world.”
After a brief pause, he continues: “And that’s what causes me concern. Some of the questions that occur to me are: Where are these devices made? What do we know about the security of these devices? Are we confident that our information is protected when we can so easily connect to the company’s information?”
“Why, just the other day on my flight, I read a magazine story about a computer chip that is intentionally built to spy on users. Well, how do we know this chip isn’t in any devices that our employees use? Do we have a specific policy in place on access? Well, if not, we need to develop one, fast.”
You realize that the CEO’s concerns extend beyond the possible issues with mobile technologies so you make the note to update policies on incident management & emerging technologies. Then, while the idea is fresh on your mind, you start to outline the scope of work.
As the CEO asks for input at the close of the meeting, you propose a series of four projects for your team:
1- An updated Mobile Device Management Policy to address his immediate concern,
2- An Identity Theft Response Plan to address a “worst-case scenario” event,
3- A Digital Currency Applicability report to address the viability of using blockchain technology, and
4- An Enterprise Cyber Program presentation to the board of directors to explain how your organization addresses cybersecurity issue.
The CEO agrees and asks that you begin with the presentation on the updated Mobile Device Management Policy in the executive meeting scheduled two weeks from today.
Project 1: Mobile Device Management (MDM) Policy
Step 1: Prepare a Scope of Work Overview
Since the CEO has agreed for you to update the company’s mobile device management (MDM) Policy, the CIO has requested you first provide a scope of work to determine the level of effort that your team will face.
Prepare an overview of the scope of work by posting a brief paragraph (three to five sentences) explaining the approach and deliverable for this project with a few bullet points that address general financial industry concerns with cybersecurity and MDM.
Post the overview to the scope of work discussion for feedback. Afterward, move to the next step, in which you will consider critical infrastructure and how it will affect compliance.

Project 1: Mobile Device Management (MDM) Policy
Step 2: Research Critical Infrastructure Concerns
After defining the scope of work, you are ready to begin updating the MDM policy. In order to determine the effectiveness of the current policy, research what critical infrastructure protection concerns affect compliance.
Consider the following list to guide your research:
impact of cyberattacks on critical infrastructure as defined by the Patriot Act of 2001
technologies used in critical infrastructure cyberattacks
cybersecurity defense principles that should be used to counter these cyberattacks
cybersecurity policy framework that should be employed to minimize the opportunity for a successful critical infrastructure cyberattack
Document the findings since they will be used in upcoming steps. In the next step, you will itemize those concerns.

Project 1: Mobile Device Management (MDM) Policy
Step 3: Itemize Critical Infrastructure Concerns
Using notes taken from the completed research in the last step, itemize the findings in a table or spreadsheet titled Crucial Concerns Worksheet that assesses:
The impact of cyberattacks on critical infrastructure as initiated by the Patriot Act of 2001 and later refined by the Department of Homeland Security (DHS).
The technologies used in critical infrastructure cyberattacks. Especially consider which and how technologies may exploit mobile device vulnerabilities.
Cybersecurity defense principles should be used to counter these cyberattacks.
This itemized list of critical infrastructure concerns will be expanded to include an evaluation of cyber-physical systems in the next step so that you can later align critical concerns to MDM policy. It will also be included as an appendix to the updated MDM policy presentation for the board of directors. Submit the Crucial Concerns Worksheet for feedback.

 

 

 

Sample Solution

unjustly. Also, in today’s world, wars are no longer fought only by states but also non-state actors like Al-Queda and ISIS, showing Vittola’s normative claim on authority is outdated. This is further supported by Frowe’s claim that the leader needs to represent the people’s interests, under legitimate authority, which links on to the fourth condition: Public declaration of war. Agreed with many, there must be an official announcement on a declaration of war (Frowe (2011), Page 59-60&63). Finally, the most controversial condition is that wars should have a reasonable chance of success. As Vittola reiterated, the aim of war is to establish peace and security; securing the public good. If this can’t be achieved, Frowe argues it would be better to surrender to the enemy. This can be justified because the costs of war would have been bigger (Frowe (2011), Page 56-7). Consequently, jus ad bellum comprises several conditions but most importantly: just cause and proportionality. This gives people a guide whether it’s lawful to enter a war or not. However, this is only one part of the theory of the just war. Nevertheless, it can be seen above that jus ad bellum can be debated throughout, showing that there is no definitive theory of a just war, as it is normatively theorised. Jus in bello The second section begins deciphering jus in bello or what actions can we classify as permissible in just wars (Begby et al (2006b), Page 323). First, it is never just to intentionally kill innocent people in wars, supported by Vittola’s first proposition. This is widely accepted as ‘all people have a right not to be killed’ and if a soldier does, they have violated that right and lost their right. This is further supported by “non-combatant immunity” (Frowe (2011), Page 151), which leads to the question of combatant qualification mentioned later in the essay. This is corroborated by the bombing of Nagasaki and Hiroshima, ending the Second World War, where millions were intently killed, just to secure the aim of war. However, sometimes civilians are accidentally killed through wars to achieve their goal of peace and security. This is supported by Vittola, who implies proportionality again to justify action: ‘care must be taken where evil doesn’t outweigh the possible benefits (Begby et al (2006b), Page 325).’ This is further supported by Frowe who explains it is lawful to unintentionally kill, whenever the combatant has full knowledge of his actions and seeks to complete his aim, but it would

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.