Cyber Security Policy
Title: ‘Cyber Policy: Country Cyber Threats Assessment’
author: “Put Your First and Last Name Here”
output:
pdf_document: default
html_document:
df_print: paged
—
## Task
Write a short briefing paper on the top-5 cyber threats facing a particular nation (2 pages). The analysis will need to take into account available data on the frequency and the potential costs of cyber attacks of different types, and their main targets. You will need to think existing or potential databases miss important details on cyber attacks. You will also need to think if we can make any statistical inferences using these data (details below). You will need to formulate feasible policies to address top-3 issues on your list.
Use this file as a template. You are in the `Country-Report-Template.Rmd` file now. First, close this file and rename it using your last and first name: `Last-Name-First-Name-Country-Report.Rmd`. Reopen the file.
When you done: compile your report in `.html` or `.docx`. Finally, save it as `.pdf` and upload it to the class website.
G
## List of cyber threats (*this is an example, you need to come up with your own list of threats*)
**DDoS Attacks**
***The scale of the problem***. Describe in 1-2 sentences the mechanism of the threat. Describe the scale of the problem: how many companies/agencies/citizens are affected? What is the total damage for all affected? Find and cite the lowest and the highest numbers on potentially affected groups and potential losses.
***Available data***. Are there specific databases (private or publicly available) that document details of each case? If not, what sources can be used to obtain case-by-case data? What are the available details on each case (in other words, what are the columns in the existing/potential dataset)? Do you think these sources lack important details (columns)? Describe in detail what important information these databases miss and if it is possible to obtain this information.
***Potential issues with data***. We usually work with sampled data and do not observe all affected cases (population of interest). Can we trust the existing or potentially data? In other words, can we use this data (i.e., our sample) to make statistical inferences about our population of interest?
There are many potential issues that prevent us from making valid conclusions about the population of interest. For example, companies or state agencies may want to hide the fact of being under attack. What are their motivations in your case? Or, customers may not know that their private data was stolen. Describe in detail all potential issues you can think of with respect to this specific threat.
**Ransomware**
…
**Data Breaches**
…
**Misinformation**
…
**Cyber Piracy**
## Potential solutions
Rank these threats and justify your ranking. Briefly describe, how would you approach top-3 of them. Explain what data you would need to conclude if your policy was effective.
Last Completed Projects
topic title | academic level | Writer | delivered |
---|