Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Case Study:  Why should businesses participate in Public-Private Partnerships for Cybersecurity?

Case Scenario:

A large regional utility company has been approached by a federally funded research and development organization (FFRDC) which is recruiting companies for participation in a government initiated public-private partnership designed to improve cybersecurity for the energy sector. The utility distributes both natural gas and electricity across a three state area that includes both urban and rural households and businesses. The utility company's board of directors is not familiar with the concept of public-private partnerships. They have hired your small consulting firm to help them make an informed decision. Their biggest question is "What's in this for us?" The second looming question is what types of resources would they be expected to contribute to the effort (e.g. money, personnel, facilities)?

Your immediate (quick response) task is to research and write a three page issues brief which addresses public-private partnerships, the types of cybersecurity improvements which could be addressed by such a partnership, the potential benefits to industry partners, and the potential risks and/or costs in resources.

Please note: if you have written a similar paper or assignment for other courses, you may consult that work but you may NOT reuse it. You must write a new white paper that specifically addresses the requirements of this assignment.

Research:

1. Read / Review the Week 7 readings.

2. Research the concepts and structures for public-private partnerships as a means of furthering public policy goals. Your starting resources are:

a. What are Public Private Partnerships (World Bank) http://ppp.worldbank.org/public-private-partnership/overview/what-are-public-private-partnerships

b. The Policy Cycle http://www.policynl.ca/policydevelopment/policycycle.html

3. Research existing or proposed public-private partnerships in cybersecurity and critical infrastructure protection. Here are some sources to get you started:

a. http://www.insaonline.org/CMDownload.aspx?ContentKey=e1f31be3-e110-41b2-aa0c-966020051f5c&ContentItemKey=161e015c-670f-449a-8753-689cbc3de85e

b. http://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity.Partnerships.pdf

c. http://csis.org/files/publication/130819_tech_summary.pdf

d.

http://www.hsgac.senate.gov/hearings/strengthening-public-private-partnerships-to-reduce-cyber-risks-to-our-nations-critical-infrastructure

e. http://www.hsgac.senate.gov/download/?id=66d59b29-25ac-4dc1-a3af-040dcfe3bd38

f. http://www.hsgac.senate.gov/download/?id=5a70808b-ff76-411d-9075-5b21c7398bf5

4. Research the DHS led public-private partnership for Critical Infrastructure Cybersecurity improvements. You should also review the requirements and provisions of the NIST Cybersecurity Framework for Critical Infrastructure Protection. Find out why DHS is encouraging the adoption of this framework.

a. http://www.dhs.gov/blog/2014/02/12/dhs-launches-c%C2%B3-voluntary-program

b. https://www.us-cert.gov/ccubedvp

c. https://www.us-cert.gov/sites/default/files/c3vp/ccubedvp-outreach-and-messaging-kit.pdf

5. Find additional sources which provide information about public-private partnerships for cybersecurity, i.e. Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations. Here are two overview /directory web pages to help you get started.

a. http://www.dhs.gov/isao

b. http://www.isaccouncil.org/memberisacs.html

Write:

Write a two to three page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for public-private partnershipswhich provides definitions and addresses the laws, regulations, and policies which permit this type of cooperation between federal, state, and local governments and private companies such as your customer (the utility company). This introduction should be suitable for an executive audience.

2. A separate section which provides an overview of public-private partnerships for cybersecurity which addresses the types of activities which the utility company could reasonably be expected to contribute to (cybersecurity activities for energy sector critical infrastructures). You should provide 3 or more specific examples.

3. An analysis of whether or not participation in a public-private partnership is likely to have benefits for the utility company (with specific examples of those benefits). After you address the benefits, address the problem of costs and/or risks which the company could expect to face (with specific examples). (One risk to consider is how much information about company operations could be exposed to the federal government.)

4. A recommendation with justification or rationale for which, if any, existing or proposed public-private partnerships the utility company should consider participating in.

Your white paper should use standard terms and definitions for cybersecurity and privacy. The following source is recommended:

• NICCS Glossary http://niccs.us-cert.gov/glossary

Submit For Grading

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91872645
  • Price:- $35

Priced at Now at $35, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to pr ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Part auniversity of neverland offers more than 300

Part A University of Neverland offers more than 300 undergraduate programs. The Bachelor of Dreams is one of the highly regarded program offered by the University. The University tries to improve all its programs by intr ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

Below are the supply and demand schedules for fresh coffee

Below are the supply and demand schedules for fresh coffee in Vancouver: Price ($/cup) Quantity Demanded  (cups/day) Quantity Supplied (cups/day) 1 440 330 2 415 360 3 390 390 4 365 420 5 340 450 6 315 480 7 290 510 a. W ...

If a router is attached to a network with a base ip address

If a router is attached to a network with a base IP address of 198.10.0.0/20 and receives a packet addressed to 198.10.10.144, answer the following questions: a. What is the network mask used by the router? (in dotted de ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As