answer the following questions

answer the following questions 

  • submit as single MS Word file under Assignments)
    • Part 1 (Refer to thew sources bellow)
      • After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level.
      • Utilize additional resources as needed.
      • Conclude with a research or policy question for further research.
      • You must utilize literature and cite properly.
      • Use APA style.
      • Provide in-text citations and references.

Submit both Parts as a single Microsoft Word document

 

Solution Preview

Cyber security management

Introduction

Cyber security involves a collection of technologies as well as practices designed to protect systems and computer from risky attack, misuse or unauthorized access.  Cyber security, is also known as information technology security. It aims at protecting computers, programs and information resources from unwanted or unauthorized access, alteration or destruction. The emergence of the new chief information security manager role has streamlined the process of cyber security in many organizations and institutions (Goodyear & Goerdel, 2010).

(1,456 words)

Open chat
Hello
Contact us here via WhatsApp