Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

UMUC Global Cyber Capacity Building Questions

UMUC Global Cyber Capacity Building Questions

UMUC Global Cyber Capacity Building Questions

Description

This project is an individual effort that you will work on throughout 

your capstone course for your Master of Science degree. In this project,

you will research cybersecurity capacity building and then develop a 

proposal to help build (improve) cybersecurity capacity by improving a 

small nation’s cybersecurity education and training for its workforce. 

You will also research public-private partnerships and additional 

international efforts whereby nations and multinational organizations 

cooperate to improve global cybersecurity including efforts wherein they

provide expertise and other types of assistance to nations needing to 

improve their cybersecurity capabilities. 

Step 1: Learn About Cybersecurity Capacity Building                                   

Read: Collett, R., & Bampaliou, N. (2021). International cyber capacity building: Global trends and scenarios. https://www.iss.europa.eu/sites/default/files/EUISSFiles/CCB%20Report%20Final.pdf

In this report, the authors discuss the findings of an international  research study, sponsored and supported by the European Commission. The  purpose of this study was to identify trends in cyber capacity building  and included information derived from interviews with subject matter  experts representing 50 organizations from around the world (See Annex  1. List of Interviews). Secondary data was obtained from public sources  including government and organizational websites and document  repositories.

Read: Ramim, M. M., & Hueca, A. (2021). Cybersecurity capacity building of human capital: Nations supporting nations. Online Journal of Applied Knowledge Management9(2), 65–85. https://doi-org.ezproxy.umgc.edu/10.36965/ojakm.2021.9(2)65-85

In this article, the authors discuss a cybersecurity capacity building framework and the roles that various nations and organization play in helping building cybersecurity capacity on a global basis.

Step 2: Research International Cooperation and Joint Efforts to Improve Global Cybersecurity                                   

The resources listed below provide information about current  international efforts to improve global cybersecurity through  cooperation between nations through projects involving businesses,  governments, nongovernmental organizations, and individuals. As you  review these materials, focus on the benefits of cross-border  cooperation for the purposes of combating cybercrime, cyberattacks, and  cyberterrorism. Continue your research by identifying additional,  international efforts to promote cybersecurity capacity building.

Government to Government Cooperation to Improve Global Cybersecurity

The Commonwealth Telecommunications Organization: https://www.cto.int/ and https://www.cto.int/consultancy/multi-stakeholder-partnerships-for-ict4d/

Commonwealth Approach for Developing National Cybersecurity Strategies https://ccdcoe.org/uploads/2019/09/CommW-15-Approach-for-developing-national-cybersecurity-strategies.pdf

United Nations International Telecommunications Union (ITU) Guide to Developing a National Cybersecurity Strategy https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-CYB_GUIDE.01-2018-PDF-E.pdf

Global Cooperation for Cybercrime Prevention

Budapest Convention on Cybercrime https://www.coe.int/en/web/cybercrime/home

INTERPOL https://www.interpol.int/en/Crimes/Cybercrime

https://www.interpol.int/en/Crimes/Cybercrime/Public-private-partnerships

  • Public-Private Partnerships and Their Use to Solve Global Problems

https://ppp.worldbank.org/public-private-partnership/overview/what-are-public-private-partnerships

https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/Overview/

FIRST: Improving Cybersecurity Together https://www.first.org/

  • Recruiting and Deploying Volunteers as Cyber Experts (Example Programs)

https://iamcybersafe.org/s/volunteers

https://cti-league.com/

  • https://cyberpeaceinstitute.org/news/cyberpeace-builders-supporting-ngos-in-the-age-of-cyber 
    Step 3: Discuss Cultural Issues as Potential Barriers to Success in Cyber Capacity Building                                   
                          Participate in a discussion with your peers about cultural Issues as  potential barriers to success in international cooperative efforts. Use  examples from your reading and research for Steps 1 and 2 along with  information from the following resources: 

https://www.hofstede-insights.com/models/national-culture/

Step 4: Discuss Ethical Issues as Potential Barriers to Success in Cyber Capacity Building                                   
                      Read: Ethics and Ethical Decision MakingParticipate in a discussion with your peers about ethical Issues as  potential barriers to success in international cooperative efforts. Use  examples from your reading and research for Steps 1, 2, and 3 along with  information from additional sources from your personal research. Ground  your discussion in one or more of the ethical theories or principles  discussed in the learning topic Ethics and Ethical Decision Making.Step 5: Research the Use of Training and Certifications to Build Cybersecurity Capacity                                   
                      In this step, you will continue your research and analysis of cyber  capacity building by examining the role that training and certifications  plays in the development and growth of a professional cybersecurity  workforce for nations around the world. Begin by reading these scholarly  articles:Blaži?, B. J. (2021). The cybersecurity labour shortage in Europe: Moving to a new concept for education and training. Technology in Society67https://doi-org.ezproxy.umgc.edu/10.1016/j.techsoc.2021.101769Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security100https://doi-org.ezproxy.umgc.edu/10.1016/j.cose.2020.102080International (multinational) organizations such as CompTIA,  EC-Council, ISACA, and the Information Systems Security Consortium play a  large role in the provision of training and in certifying the  knowledge, skills, and abilities. Training and certifications are also  provided by technology vendors such as CISCO and Microsoft. Consider the  following types of certifications and assess their value to nations as  potential solutions to the need for professionalization of the cyber  workforce. 

  • Basic and Advanced Cybersecurity Knowledge and Skills

CISCO Certifications: CCNA-Security, CCNA Cyber Ops

  • CompTIA Certifications: Security+, Network+, CASP

EC-Council Certifications: CSCU, CEH, CHFI, CTIA, C|CISO

  • ISACA Certifications: CISA, CISM, CRISC

(ISC)2 Certifications: CAP, CISSP, CSLP, SSCP

  • Related Knowledge and Skills

Business Skills Certifications: PMI-PBA, PMI-PMP

  • Risk Management Certifications

Disaster Recovery Certifications

  • Operating Systems Administration Certifications (MS Windows, Linux, etc.)

Note: Additional cybersecurity workforce certifications can be found in the US Department of Defense list of baseline certifications: https://public.cyber.mil/cw/cwmp/dod-approved-8570-baseline-certifications/

  • Step 6: Prepare an Annotated Bibliography                                   
                          Choose the 10 best sources from your searches for articles, papers,  and dissertations. Focus on sources that give details about your  research topic. Next, write the reference list entry (APA citation  style) for each source. Alphabetize your list of reference list entries.  After you have the correctly ordered list, number your entries from 1  to 10. Note: different reference entry formats are used for different  types of sources. Review the UMGC Library’s “Get Help > Citing and  Writing for samples and explanations of the formatting rules. If you are  using APA format, your list should look something like the following. 

Authors. (date). Article title. Publication name, vol(issue), #-#.

  • Authors. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.

Authors. (date). Book title. City, state (or country) of publication: Publisher.

  • Next, write your annotations for each source in your list. In an annotated bibliography,  the annotation is a paragraph or two placed under the reference list  entry for each source. For this assignment, the annotation should be a  combination of factual information from the source and your evaluation  (opinion) of the quality and usefulness of the information; you will be  combining the descriptive and analytical styles of annotations.To accomplish this, you should read the abstract, introduction  section, and closing sections for each article or paper. For  dissertations, look over the Introduction and the Literature Review  (usually the first two chapters). From this information, develop a short  informative or descriptive summary of the source that includes: (a) a  description the information provided in the source, (b) how you plan to  use this source to support your analysis of your research topic, and (c)  your thoughts and opinions about the utility or quality of the source.  Each annotation should be approximately 100-125 words (five to seven  sentences). Place this summary after the reference list entry for the  source.For more information about annotated bibliographies, see https://libguides.umgc.edu/annotated-bibliography-apa

Step 7: How Can Cyber Capacity Building Help Nations Protect their Homelands?                                   

  • Using your research and analysis from steps 1-6, prepare an  eight-to-10-page analytical summary of your research in which you  identify and discuss how wealthy nations and developing nations can and  should work together to protect their homelands by improving cyber capacity at the national level. Your summary should address the following:

What cyber capacity building is and why it is important to global cybersecurity efforts.

  • The uses of public-private partnerships and government to government  cooperation to build cyber capacity and improve global response to  cyberattacks, cybercrime prevention, and address ongoing issues arising  from cyber terrorism. (Provide and discuss five or more specific  examples of programs or cooperative efforts.)

The benefits of recruiting and deploying volunteer subject matter experts to provide support, including pro bono professional services, in the context of public-private partnerships for cybersecurity capacity building.

  • An analysis in which you

Identify and discuss the three most important reasons why individual  nations should develop their own trained, skilled, and professional  cybersecurity workforce.

Identify and discuss the three largest risks to wealthy nations if  they do not help smaller nations develop their cyber incident response  capabilities including training and educating a cybersecurity workforce.

Identify and discuss the three most significant barriers or  constraints which could adversely impact the success of international  cooperative efforts to build cyber capacity.

Three to five recommendations for international cyber capacity building efforts (based upon your research and analysis).

Close your analytical summary paper with an appropriate concluding  section that addresses the question: How does cyber capacity building  help nations protect their homeland?Step 

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20