Order ID | 53563633773 |
Type | Essay |
Writer Level | Masters |
Style | APA |
Sources/References | 4 |
Perfect Number of Pages to Order | 5-10 Pages |
Transnational Legal Compliance and International Standards
Transnational, Legal, Compliance, International, Standards
Your team has been given the responsibility of conducting a baseline analysis for
establishing a secure communications network for your assigned agency at the summit.
The risk assessment process for a baseline analysis requires a multidisciplinary
examination of the internal and external cyber environments.
The graded assignment for Project 1 is a Cybersecurity Policy and Baseline Analysis
Report, which should be a minimum of 20 pages. There are 16 steps in this project and
it should take about 17 days to complete.
This project is longer in duration than others in the course because some of the work
you will complete also lays the foundation for work to be completed in Projects 2, 3, and
4. Begin with Step 1, where you will complete preparatory exercises designed to
familiarize you with the tools and processes to be used throughout the project.
This is what I will be working on as a team member of this project: Step 14, 15, and 16.
14. Based on the policy matrix and the environmental review and analysis you
developed in previous steps; the team should provide a two- to three-page
Transnational Legal Compliance Report that itemizes all of the compliance
requirements that are overlapping or similar among all the nations on the cyber security
task force for the conference.
Include a short analysis on how these requirements are consistent (or not) with the
Tallinn Manual 2.0 on the International Law Applicable to the Conduct of Cyber
Operations.
In accordance with your team agreement, a designated team member will submit the
Digital Forensic Environment Review and Analysis and the Transnational Legal
Compliance Report to the drop box.
Then, proceed to the next step in the project to identify the critical or key international
standards determined in previous steps.
15. Now that you have looked at the regulations used by the other nations, in this step
you will consider international initiatives that foster cooperation with each other.
Among the items identified in the Transnational Legal Compliance Report and the policy
matrix from the previous steps are certain international initiatives that each country has
undertaken to demonstrate cooperation and compliance with other nations.
From the information you have gathered and what you have learned in previous
courses, determine as a team which of these initiatives provides the best opportunity for
cooperation among all the delegates at the conference.
Your team should develop a two- to three-page International Standards Report. Then, in
accordance with your team agreement, a designated team member will submit the
report for feedback. State your sources and support your recommendations with the
facts that have been gathered.
16. As a team, you will work together to create a Cybersecurity Policy and Baseline
Analysis Report. This report will address the current cyber disposition of legal standing
for the Five Eyes (FVEY) country you represent regarding international cyber relations.
This final report will be a minimum of 20 pages in length and meet APA standards for
writing.
Refer to the Cybersecurity Policy and Baseline Analysis Report Instructions for further
details of what to include and the general format of the report. After you have
collaborated with your team, each team member should make revisions and submit an
individual report, independent of the team. Submit your Cybersecurity Policy and
Baseline Analysis Report for assessment.
Five Eyes Alliance
The United States, in cooperation with the United Kingdom, Australia, Canada, and New
Zealand established an agreement known as the Five Eyes (FVEY) alliance under
which these countries agree to both collect, analyze, and share signals intelligence
(SIGINT) and not spy on each other as adversaries (Mansfield, 2017).
The members of FVEY use their technical capabilities to collect massive amounts of
information on electronic communications world-wide, to target specific individuals and
groups, and to retain information about other persons for extended periods of time. This
data is collected at “Special Source Operations” (SSO) locations around the globe and
stored in the Five Eyes nations’ databases (Parsons, 2015).
Signals intelligence surveillance plays a critical role in the United States’ cybersecurity
and cyber-offense approaches. Its cybersecurity posture is dependent upon the ability
to protect and defend communications networks from infiltration, manipulation, and
exploitation by adversaries both foreign and domestic.
The use of deep packet inspection equipment throughout global networks allows the
United States and the other FVEY members to collect metadata and content, and very
intricate signals development operations enable access to, infiltration of, and
modification of data on the networks of adversaries as part of their cyber-offensive
strategies.
Once targets are identified, the SIGINT agencies can then identify groups and their
relationships with the adversary under surveillance through the development of
communications association graphs. Data collected are analyzed and filtered to
examine information that may assist in a specific SIGINT operation. This data can then
be used to further target specific individuals and to exploit and manipulate their devices,
systems, and/or networks (Parsons, 2015).
One of the more difficult aspects of the FYVE relationship is that of the sharing of
intelligence data. Disclosure of the intelligence data isn’t as much of a concern as
inadvertent or unauthorized disclosures that put methods, sources, and platforms for
intelligence collection at risk.
While military commanders have long pushed for a common interface for actionable
intelligence that can be using in operations planning, intelligence and political leaders
have resisted the broadening of intelligence sharing databases due to concerns about
endangering their individual nations’ assets (Erwin, 2015).
References
Erwin, S. (2015, September). U.S. Central Command leads push to connect allies in
common network. National Defense, C(742), 20-21. (Accession no. 109203109).
Mansfield, H. (2017, April 1). Using VPNs to protect your Internet privacy. Retrieved
from https://haroldmansfield.com/using-a-vpn-to-protect…
Parsons, C. (2015, 23 March). Beyond privacy: Articulating the broader harms of
pervasive mass surveillance. Media and Communications, 3(3), 1-11. Retrieved
from http://www.cogitatiopress.com/mediaandcommunicatio…
RESOURCES
UK Perspective
Australian Perspective
New Zealand Perspective
US Perspective
Canadian Perspective
|
||||||||||||||||||||||||||||||||
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDERCLICK ON THE LINK HERE: https://www.perfectacademic.com/orders/ordernowAlso, you can place the order at www.collegepaper.us/orders/ordernow / www.phdwriters.us/orders/ordernow |
||||||||||||||||||||||||||||||||
|