SlideShare a Scribd company logo
1 of 14
Submit by 6am on 16th June
As a backlash, the professional model, which reflects a "we are
the experts and you are not" attitude, alienated the police from
the public. Problems and crime kept growing, and people
wanted to be more involved in their communities. Therefore,
community members started to work closely with the police.
The police saw their resources diminish and decided it was
critical to engage the communities to more effectively combat
rising crime.
Today, the vast majority of law enforcement agencies state that
they subscribe to the community policing philosophy. The
implementation of the philosophy is varied, but most agencies
acknowledge the value of having a positive working relationship
within the community.
Thus, it is important to understand the history of modern
policing to comprehend some possible conclusions as to why
agencies began adopting the community policing philosophy.
Tasks:
Prepare a three to four page report answering the following
questions.
· What are the main reasons for the majority of US law
enforcement agencies to adopt the community policing
philosophy?
· What is the most important aspect of community policing that
is attractive to the community?
· What is the most important aspect of community policing that
is attractive to the police?
· What aspects of prior policing models are not acceptable in
today's communities?
Note: Use at least three scholarly sources, with at least one
source that is not part of the assigned readings. Include a
separate page at the end of the report, in APA format, that links
back to your in-text citations and supports your
recommendations.
Assignment 3 Grading Criteria
Maximum Points
Analyzed the main reasons that led the majority of US law
enforcement agencies to adopt the community policing
philosophy.
28
Evaluated the most important aspect of community policing that
is attractive to the community and the police.
28
Evaluated various aspects of prior policing models that are not
acceptable in today's communities.
24
Wrote in a clear, concise, and organized manner; demonstrated
ethical scholarship in the accurate representation and attribution
of sources; and used accurate spelling, grammar, and
punctuation.
20
Total:
100
Class,
I'm providing a recently example of a critical analysis written
by Dr. Valorie King. This example is based on the 1st case
study for this class, CSIA 350.
I think most of you have a good idea of what's required for the
case studies, but use the information as you need. I will
continue to grade appropriate.
A Critical Analysis (CA) is a discussion response that has an
introductory paragraph, an analysis section (around 3
paragraphs or so), and a brief summary. For Case Study #1, a
really good CA would have looked something like this:
There are many reasons why a business should invest in
cybersecurity products and services. In [her / his] essay,
[student name] addressed ethical principles which drive such
investments. While ethics are important, the business needs and
requirements for IT security must also be considered. In this
critical analysis response, I would like to take a deeper look at
three important points which drive businesses to invest in IT
security.
First, consider the question of the Business Benefits of IT
Security products and services. Businesses exist to make a
profit (Vitez, 2016). Making a profit requires that losses and
unnecessary costs be avoided. This is where the business benefit
of IT security products comes into play. An anti-virus product
can prevent a malware infection (Drew, 2011). Spending some
money to buy an anti-virus product to prevent malware will save
money in the long run since the business will not have to pay to
cleanup malware infections on laptops, workstations, and
servers.
Second, consider the question of Why an organization should
invest in IT security technologies. This is very similar to the
first question. But, in addition to the financial benefits (cost
avoidance) there are also legal and regulatory reasons why an
organization should invest in IT security technologies
(Smedinghoff, 2005). Many laws require that companies use
encryption to protect private information (HIPAA, FERPA,
etc.). This is an IT security technology that a company may be
legally required to purchase (invest in).
Third, consider Where an organization should focus its attention
& why. Technology is only one type of investment that a
company should make when it comes to IT security. Investing in
people by hiring well qualified security professionals and then
providing ongoing training is another area where a company
needs to spend money to protect information, information
systems, and information infrastructures (ISACA, 2009). Even
the best IT security products need people who understand how
to configure, test, and operate those products. For this reason,
an organization should also focus its attention on hiring the best
security professionals that it can afford. Then, the company
should keep these people the best by investing in training.
In summary, there are many reasons why a business should
invest in IT security and why those investments should include
both people and products (technologies). But, the bottom line is
that a business needs to make a profit to stay in business.
Investing in IT security products is an important part of
protecting profits and avoiding unnecessary costs.
References
Drew, J. (2011, August 30). The benefits of having anti-virus
protection. TopTenReviews. Retrieved from http://anti-virus-
software-review.toptenreviews.com/learning-center/the-
benefits-of-having-anti-virus-protection.html
ISACA. (2009). An introduction to the business model for IT
security. Retrieved from http://www.isaca.org/knowledge-
center/research/documents/introduction-to-the-business-model-
for-information-security_res_eng_0109.pdf
Smedinghoff, T. (2005, November). The new law of information
security: What companies need to do now. The Computer and
Internet Lawyer Journal, 9-25.
Vitez, O. (2016). What are the effects of profit or loss in a
business organization? Houston Chronicle. Retrieved from
http://smallbusiness.chron.com/effects-profit-loss-business-
organization-824.html
Reply 1 needed
At this time, I would definitely not give the sponsor an answer
about the timeline because I have not had a chance to review
and understand the project. Instead, I would let the sponsor
know that I am pleased to have been brought into the project
and I am looking forward to learning about their goals. I would
then let the sponsor know that I need time to review the project
and establish benchmarks and milestones. I would also need to
examine potential risks and downfalls that would need to be
resolved or avoided in order to minimize the possibility of the
project taking longer than it should. Once I drew up a true
schedule and timeline, including my research, then I would be
able to give him a better idea on whether or not his time goals
could be met.
Reply 2 needed
Based on our readings, No, I definitely would not give the
executive sponsor an answer at this time. If you were to say yes
we could do in 6 months or less, or even a ‘maybe,’ you would
pretty much be setting yourself up for failure and giving false
hope to the executives. As a PM, I would answer the executive
sponsor with “Since this is a new project for the company, I will
need to do some research and analyze the project specifics
first. Then I prefer to use software in order to accurately
calculate everything and come up with the best possible
timeline for you.”
Reply 3 needed
Based on the scenario that has been given I would not be able to
give the executive sponsor an answer because I have not yet
analyzed the project. What if I gave the answer of 6months and
saw the project afterwards but then realized I made a mistake.
Well, if it were a lower duration maybe that is good but if it
were more time to consume that when the little problem comes
since the answer has already been given. I think the way I
would phrase it to him is : "I'm currently the new appointed PM
for this major project, I have not yet gotten a chance to look at
it, but I will let you know as soon as possible what the duration
time will be after the planning and scheduling have been
settled". I would expect him to be understanding and say
"indeed not a problem, just email me or let me know when you
do get the chance."
I think this is the way I would have handled it because I work
for a hotel, and I have many of these projects handed to me, I
usually answer the way I did and 9/10 I get the answer that I
was expecting. On the other hand, I think it would be perfect
after reviewing the project to create deadlines and plan the
delivery of the projects so that we know the duration that should
be estimated. By having the effort, duration and the elapsed
times for the planning of the project, I think that it could be
accomplished with a good amount of months. With this, you can
give the executive a great answer.
Reply 1 needed
John,
Seems you developed a vast understanding of how real cyber
attacks are. In saying that, I would venture to say that you will
agree administrations must take the necessary measure to
combat cyber attacks. Based on the high level targets that have
been successfully infiltrated, clearly no one is exempt from
being attacked. The proper handling of government data is very
important. Government employees must be aware of how
information should be cared for based on it's sensitivity.
All agencies should be manned with a cyber security
team who are responsible for training all data custodians as well
maintained security features.
R,
E.W.
Reply 2 needed
I thought we were supposed to answer the question of our
administration would ensure that Digital Government services
are secure?
· What is meant by "Digital Government services?" (previously
called "e-Government" services)
· Where have past administrations fallen short in protecting
Digital Government / e-Government services?
· What is meant by "Threats" (i.e. individual hackers, politically
motivated hacktivists, criminal enterprises, and unfriendly
"nation state" actors)
I feel like the questions for the debate were not answered.
Growth has been observed in the Information Technology field
since the 1940s. Now, in more modern times, the role of E-
government, or virtual government has been on the rise. This is
providing the American people an open platform allowing for
the use and re-use of government data while preserving privacy
in the process. (Office of Management and Budget, 2016)
Privacy is paramount in this process; the people won't trust the
government with data, if they feel the data is not protected.
That being said, the government is taking stride to anonymize
data, especially when we are discussing health data, PII, or tax
data. We have seen that between "January 1, 2009 and May 31,
2012, there have been 268 breach incidents in government
agencies with more than 94 million records containing
personally identifiable information exposed." (Data Breaches,
2012) Threats come in many forms: malicious software, nation
state actors (people who are working for adversaral
governments), hacktivists (hackers with a cause), etc. Threats
are what we can expect to exploit vulnerabilities in computer
systems.
You did mention some of this, but I feel you touched the tip of
the iceberg.
Digital government services are built three "layers": the
information, or data, such as weather and census data plus other
supporting data, the platform by which data is delivered and
managed for access by people, and the presentation layer, which
determines the way in which people see the and receive the data
through the Internet, mobile applications, and other delivery
methods (Office of Management and Budget, 2016) These
layers are functional in that they are designed to facilitate the
development of open government through the use Internet -
based media functionality. The problem lies with the number of
breaches that occur constantly. Hopefully, the Data Security
and Breach Notification Act of 2015, will help enforce
disclosure of breaches when they happen. (Nelson, 2015)
Because there have been 268 breaches recorded between the
beginning of 2009 and 2012 where we have seen the breach of
personal information, we need to be vigilant in mitigating
them. Even a breach by Russian hackers exfiltrating
information from the Democratic national Convention just was
reported; information regarding presidential candidates was
stolen.
Can you tell us how past administrations failed at securing
services?
P.S. I am not trying to be rude by any means; I simply did not
feel the questions were answered here. If you feel I
misunderstood your viewpoint, then help me to better
understand.
Reply 3 needed
Incident response is a piece of the cyber security puzzle, but it
is worthless unless you do it in a timely fashion. Creating a
culture of security awareness is imperative to creating a defense
in depth strategy for enterprise networks. Users are the weakest
link in this, and attackers will frequently exploit them. Many
breaches stem internally from people's ignorance or being
careless with opening email or sharing passwords.
(Abawajy, 2014). This can easily result in a breach of any
network, whether intentional or not. I have personally seen this
in action; mostly because people do not understand what they
are doing when they are clicking things while browsing the
Internet. Likewise, one user can bypass all the security
mechanism present on a network. Check out
"(http://www.theregister.co.uk/2010/01/14/google_china_attack
_analysis/)." (Grauer, 2016) “Failing to deliver the cyber risk
information that board members want, in a way they understand,
will not go unnoticed,” said Ryan Stolte, Chief Technology
Officer and Co-Founder of Bay Dynamics. And there will be
repercussions. 59 percent of board members surveyed said that
there is a good chance that one or more IT and security
executives who fail to provide useful and actionable
information in their reports would lose their jobs.
So if that wasn't enough motivation, there are guides that can be
obtain from NIST to guide you on create secure configurations
for computer systems and servers. You can also access
iase.disa.mil to get information on Secure Technical
Information Guides (STIGs) to assist in endeavors like this as
well.
Abawajy, J. (2014). User preference of cyber security awareness
delivery methods. Behaviour & Information Technology, 33(3),
236-247.
Grauer, Y. (2016). Forbes Welcome. Forbes.com. Retrieved 14
June 2016, from
http://www.forbes.com/sites/ygrauer/2016/06/14/cyber-security-
executives-need-to-step-up-their-game-heres-
why/#d8c3ea43be1a
Digital Government, also know an E-Government is the
government’s way of making government data easily assessable
through Internet Technology (I.T.). Digital Government also
aids and encourages the interaction between citizens and
government agencies as well as allows agencies to provide easy,
efficient government services to customers (107th Congress,
2002). With the convenience of massive amounts of easily
accessible government data comes the need for cyber security to
protect from threats. A cyber security threat is any malicious
entity that can directly cause or influence the lost, theft or
misuse of secured data. These threats can be launched from
various sources, e.g., common hackers, insider threats, criminal
enterprises (ICS-Cert, 2016).
As an administration we will ensure digital government services
are secure by first developing an engrained understanding of the
potential threats. After such, we will establish the necessary
security mechanisms to combat these threats and employ
maintainers to ensure our security methods are updated and
remain effective. We will constantly monitor potential threats
and adjust/upgrade our security measure to defend all new
threats. We will ensure handlers of information are trained and
cognizant of how to properly receive, distribute and maintain
government information. In addition all employees will be able
to recognize any system behavior that may imply the system is
under attack. We will ensure reporting procedures are well
known amongst all handlers of government information. We
will emphasize and enforce the requirement to report all
security breaches in a timely manner and conduct rehearsals on
system recovery procedures.
In the past, seemingly in an attempt to conceal the information,
administrations have delayed reporting security breaches. In a
2014 Computer World article, Darlene Storm wrote about
hacked government agencies. These agencies included the White
House, USPS and NOAA. All of the aforementioned had
unexplainable delays in reporting cyber security
breaches (Storm, 2014). When administrations fail to
immediately report data breaches they risk the chance of
hackers doing more damage. The sooner the violation is
reported the sooner a solution can be implemented and recovery
can begin.
References
107th Congress. (2002, December 17). Retrieved from National
Institute of Standards and Technology:
http://www.nist.gov/director/oism/upload/PL107-347.pdf
ICS-Cert. (2016). Cyber Threat Source Descriptions. Retrieved
from ICS-Cert: https://ics-cert.us-cert.gov/content/cyber-threat-
source-descriptions
Storm, D. (2014, November 17). List of hacked government
agencies grows: State Department, White House, NOAA &
USPS. Retrieved from Computer World:
http://www.computerworld.com/article/2848779/list-of-hacked-
government-agencies-grows-state-department-white-house-
noaa-and-usps.html
How will your administration ensure that Digital Government
services are secure?
First, my administration will not hide breaches, once they are
identified. We see that with the NOAA hack, Representative
Wolf, stated "NOAA told me it was a hack and it was China."
(Storm, 2016) Representative Wolf goes onto say NOAA
covered up the breach as well. (Storm, 2016) I would set forth
an initiaive to push through the Data Security and Breach
Notification Act of 2015 to hold agencies accountable in the
case of breaches when they occur. This presents a clear and
present danger to government services as they provide
information and services to the American citizens. Digital
government services are built three "layers": the information, or
data, such as weather and census data plus other supporting
data, the platform by which data is delivered and managed for
access by people, and the presentation layer, which determines
the way in which people see the and receive the data through
the Internet, mobile applications, and other delivery methods
(Office of Management and Budget, 2016) We have seen that
between "January 1, 2009 and May 31, 2012, there have been
268 breach incidents in government agencies with more than 94
million records containing personally identifiable information
exposed." (Data Breaches, 2012) Threats come in many forms:
malicious software, nation state actors (people who are working
for adversaral governments), hacktivists (hackers with a cause),
etc. Threats are what we can expect to exploit vulnerabilities in
computer systems.
Digital government services are meant to be open platform to
provide the American people with information in a way that
allows for the creation of data once, then allowing agencies to
collaborate to generate consistent data for people to access
while preserving privacy throughout the process. (Office of
Management and Budget, 2016) One way this is accomplished,
agencies are using tools to tailor services to the needs of users
and tools help people to complete complex forms, such as
FAFSA forms, reducing form completion time by 66%. (Keller
& Zinner, 2015) This is done through the use of Application
Programming Interfaces, or APIs. (Office of Management and
Budget, 2016) Also, mobile is quickly transforming the way
data is delivered as well; "By 2015, more Americans will access
the Internet via mobile devices than desktop PCs." (Office of
Management and Budget, 2016) The challenge lies in the
ability of the government to provide the public with data
quickly and securely.
As we have seen just in the past few years, various government
agencies have been breached, and millions of personal records
have been compromised. Past administrations seem to have
failed in establishing a breach and notification standard, making
agencies or other entities accountable for breaches, and enabled
the abilities of agencies to better share threat-based information
(Government Accountability Office, 2016) Now we have the
Data Security and Breach Notification Act of 2015, introduced
to require notification of breaches within the government, which
also specifies criminal penalties of fines, jail time, or both, for
not admitting to breaches causing economic damage to people.
(Nelson, 2015) This will help to enforce the standards of
notifications of breaches to better inform the public to enhance
government relationships with the public. Hopefully, this will
lead to better interagency threat knowledge sharing as well.
Legal challenges present issues between agencies to allowing
agencies to share this important information; these barriers need
to be removed to enable agility in securing digital government
services.
REFERENCES
Data Breaches in the Government Sector. (2012). Retrieved 14
June 2016, from https://www.rapid7.com/docs/data-breach-
report.pdf
Government Accountability Office,. (2016). Privacy in the
Digital Age: Preventing Data Breaches and combating cyber
crime.. Washington, D.C.: U.S. Government Publishing Office.
Keller, E., & Zinner, C. (2015). Streamlining Government
Services in the Digital Age. Public Manager, 44(2), 29-30.
Nelson, B. (2015). S.177 - 114th Congress (2015-2016): Data
Security and Breach Notification Act of 2015. Congress.gov.
Retrieved 14 June 2016, from
https://www.congress.gov/bill/114th-congress/senate-bill/177
Office of Management and Budget. (2016). Digital Government:
Building a 21st Century Platform to Better Serve the American
People. Whitehouse.gov. Retrieved 14 June 2016, from
https://www.whitehouse.gov/sites/default/files/omb/egov/digital
-government/digital- government.html
Storm, D. (2016). List of hacked government agencies grows:
State Department, White House, NOAA & USPS.
Computerworld. Retrieved 14 June 2016, from
http://www.computerworld.com/article/2848779/list-of-hacked-
government-agencies-grows- state-department-white-
house-noaa-and-usps.html
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx

More Related Content

Similar to Submit by 6am on 16th JuneAs a backlash, the professional mode.docx

1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Blog Global Capital Social Media Policy 012510
Blog Global Capital Social Media Policy 012510Blog Global Capital Social Media Policy 012510
Blog Global Capital Social Media Policy 012510James C. Roberts III
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
English Essay Steel. Online assignment writing service.
English Essay Steel. Online assignment writing service.English Essay Steel. Online assignment writing service.
English Essay Steel. Online assignment writing service.Christine Jones
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEDDY KOVACEVICH
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docxaryan532920
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxcuddietheresa
 
How To Write A 500 Word Essay On Car
How To Write A 500 Word Essay On CarHow To Write A 500 Word Essay On Car
How To Write A 500 Word Essay On CarMary Calkins
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdRosa Williams
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdfinfosec train
 

Similar to Submit by 6am on 16th JuneAs a backlash, the professional mode.docx (13)

1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Blog Global Capital Social Media Policy 012510
Blog Global Capital Social Media Policy 012510Blog Global Capital Social Media Policy 012510
Blog Global Capital Social Media Policy 012510
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
English Essay Steel. Online assignment writing service.
English Essay Steel. Online assignment writing service.English Essay Steel. Online assignment writing service.
English Essay Steel. Online assignment writing service.
 
EKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IPEKovacevich-IT697-Phase 5 IP
EKovacevich-IT697-Phase 5 IP
 
Week 10 Discussion Information Security and Digital Crime and .docx
 Week 10 Discussion Information Security and Digital Crime and .docx Week 10 Discussion Information Security and Digital Crime and .docx
Week 10 Discussion Information Security and Digital Crime and .docx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
 
How To Write A 500 Word Essay On Car
How To Write A 500 Word Essay On CarHow To Write A 500 Word Essay On Car
How To Write A 500 Word Essay On Car
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 

More from picklesvalery

NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docxNPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docxpicklesvalery
 
Now that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docxNow that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docxpicklesvalery
 
Now that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docxNow that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docxpicklesvalery
 
Now that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docxNow that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docxpicklesvalery
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxpicklesvalery
 
Now that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docxNow that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docxpicklesvalery
 
Now that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docxNow that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docxpicklesvalery
 
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docxNovel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docxpicklesvalery
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxpicklesvalery
 
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docxNovember-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docxpicklesvalery
 
NOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docxNOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docxpicklesvalery
 
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docxNOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docxpicklesvalery
 
NOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docxNOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docxpicklesvalery
 
Note Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docxNote Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docxpicklesvalery
 
Note I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docxNote I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docxpicklesvalery
 
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docxNote Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docxpicklesvalery
 
Note Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docxNote Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docxpicklesvalery
 
Note A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docxNote A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docxpicklesvalery
 
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docxNotable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docxpicklesvalery
 
Note 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docxNote 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docxpicklesvalery
 

More from picklesvalery (20)

NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docxNPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
NPV, IRR, Payback period,— PA1Correlates with CLA2 (NPV portion.docx
 
Now that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docxNow that you have had the opportunity to review various Cyber At.docx
Now that you have had the opportunity to review various Cyber At.docx
 
Now that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docxNow that you have completed a series of assignments that have led yo.docx
Now that you have completed a series of assignments that have led yo.docx
 
Now that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docxNow that you have completed your paper (ATTACHED), build and deliver.docx
Now that you have completed your paper (ATTACHED), build and deliver.docx
 
Now that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docxNow that you have identified the revenue-related internal contro.docx
Now that you have identified the revenue-related internal contro.docx
 
Now that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docxNow that you have read about Neandertals and modern Homo sapiens.docx
Now that you have read about Neandertals and modern Homo sapiens.docx
 
Now that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docxNow that you have had an opportunity to explore ethics formally, cre.docx
Now that you have had an opportunity to explore ethics formally, cre.docx
 
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docxNovel Literary Exploration EssayWrite a Literary Exploration Ess.docx
Novel Literary Exploration EssayWrite a Literary Exploration Ess.docx
 
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docxNotifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
Notifications My CommunityHomeBBA 3551-16P-5A19-S3, Inform.docx
 
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docxNovember-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
November-December 2013 • Vol. 22No. 6 359Beverly Waller D.docx
 
NOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docxNOTEPlease pay attention to the assignment instructionsZero.docx
NOTEPlease pay attention to the assignment instructionsZero.docx
 
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docxNOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
NOTE Use below Textbooks only. 400 WordsTopic Which doctrine.docx
 
NOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docxNOTE Everything in BOLD are things that I need to turn in for m.docx
NOTE Everything in BOLD are things that I need to turn in for m.docx
 
Note Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docxNote Be sure to focus only on the causes of the problem in this.docx
Note Be sure to focus only on the causes of the problem in this.docx
 
Note I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docxNote I’ll provide my sources in the morning, and lmk if you hav.docx
Note I’ll provide my sources in the morning, and lmk if you hav.docx
 
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docxNote Here, the company I mentioned was Qualcomm 1. Email is the.docx
Note Here, the company I mentioned was Qualcomm 1. Email is the.docx
 
Note Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docxNote Please follow instructions to the T.Topic of 3 page pape.docx
Note Please follow instructions to the T.Topic of 3 page pape.docx
 
Note A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docxNote A full-sentence outline differs from bullet points because e.docx
Note A full-sentence outline differs from bullet points because e.docx
 
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docxNotable photographers 1980 to presentAlmas, ErikAraki, No.docx
Notable photographers 1980 to presentAlmas, ErikAraki, No.docx
 
Note 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docxNote 2 political actions that are in line with Socialism and explain.docx
Note 2 political actions that are in line with Socialism and explain.docx
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Submit by 6am on 16th JuneAs a backlash, the professional mode.docx

  • 1. Submit by 6am on 16th June As a backlash, the professional model, which reflects a "we are the experts and you are not" attitude, alienated the police from the public. Problems and crime kept growing, and people wanted to be more involved in their communities. Therefore, community members started to work closely with the police. The police saw their resources diminish and decided it was critical to engage the communities to more effectively combat rising crime. Today, the vast majority of law enforcement agencies state that they subscribe to the community policing philosophy. The implementation of the philosophy is varied, but most agencies acknowledge the value of having a positive working relationship within the community. Thus, it is important to understand the history of modern policing to comprehend some possible conclusions as to why agencies began adopting the community policing philosophy. Tasks: Prepare a three to four page report answering the following questions. · What are the main reasons for the majority of US law enforcement agencies to adopt the community policing philosophy? · What is the most important aspect of community policing that is attractive to the community? · What is the most important aspect of community policing that is attractive to the police? · What aspects of prior policing models are not acceptable in today's communities? Note: Use at least three scholarly sources, with at least one source that is not part of the assigned readings. Include a separate page at the end of the report, in APA format, that links
  • 2. back to your in-text citations and supports your recommendations. Assignment 3 Grading Criteria Maximum Points Analyzed the main reasons that led the majority of US law enforcement agencies to adopt the community policing philosophy. 28 Evaluated the most important aspect of community policing that is attractive to the community and the police. 28 Evaluated various aspects of prior policing models that are not acceptable in today's communities. 24 Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in the accurate representation and attribution of sources; and used accurate spelling, grammar, and punctuation. 20 Total: 100 Class, I'm providing a recently example of a critical analysis written by Dr. Valorie King. This example is based on the 1st case study for this class, CSIA 350. I think most of you have a good idea of what's required for the case studies, but use the information as you need. I will continue to grade appropriate. A Critical Analysis (CA) is a discussion response that has an
  • 3. introductory paragraph, an analysis section (around 3 paragraphs or so), and a brief summary. For Case Study #1, a really good CA would have looked something like this: There are many reasons why a business should invest in cybersecurity products and services. In [her / his] essay, [student name] addressed ethical principles which drive such investments. While ethics are important, the business needs and requirements for IT security must also be considered. In this critical analysis response, I would like to take a deeper look at three important points which drive businesses to invest in IT security. First, consider the question of the Business Benefits of IT Security products and services. Businesses exist to make a profit (Vitez, 2016). Making a profit requires that losses and unnecessary costs be avoided. This is where the business benefit of IT security products comes into play. An anti-virus product can prevent a malware infection (Drew, 2011). Spending some money to buy an anti-virus product to prevent malware will save money in the long run since the business will not have to pay to cleanup malware infections on laptops, workstations, and servers. Second, consider the question of Why an organization should invest in IT security technologies. This is very similar to the first question. But, in addition to the financial benefits (cost avoidance) there are also legal and regulatory reasons why an organization should invest in IT security technologies (Smedinghoff, 2005). Many laws require that companies use encryption to protect private information (HIPAA, FERPA, etc.). This is an IT security technology that a company may be legally required to purchase (invest in). Third, consider Where an organization should focus its attention & why. Technology is only one type of investment that a
  • 4. company should make when it comes to IT security. Investing in people by hiring well qualified security professionals and then providing ongoing training is another area where a company needs to spend money to protect information, information systems, and information infrastructures (ISACA, 2009). Even the best IT security products need people who understand how to configure, test, and operate those products. For this reason, an organization should also focus its attention on hiring the best security professionals that it can afford. Then, the company should keep these people the best by investing in training. In summary, there are many reasons why a business should invest in IT security and why those investments should include both people and products (technologies). But, the bottom line is that a business needs to make a profit to stay in business. Investing in IT security products is an important part of protecting profits and avoiding unnecessary costs. References Drew, J. (2011, August 30). The benefits of having anti-virus protection. TopTenReviews. Retrieved from http://anti-virus- software-review.toptenreviews.com/learning-center/the- benefits-of-having-anti-virus-protection.html ISACA. (2009). An introduction to the business model for IT security. Retrieved from http://www.isaca.org/knowledge- center/research/documents/introduction-to-the-business-model- for-information-security_res_eng_0109.pdf Smedinghoff, T. (2005, November). The new law of information security: What companies need to do now. The Computer and Internet Lawyer Journal, 9-25. Vitez, O. (2016). What are the effects of profit or loss in a business organization? Houston Chronicle. Retrieved from
  • 5. http://smallbusiness.chron.com/effects-profit-loss-business- organization-824.html Reply 1 needed At this time, I would definitely not give the sponsor an answer about the timeline because I have not had a chance to review and understand the project. Instead, I would let the sponsor know that I am pleased to have been brought into the project and I am looking forward to learning about their goals. I would then let the sponsor know that I need time to review the project and establish benchmarks and milestones. I would also need to examine potential risks and downfalls that would need to be resolved or avoided in order to minimize the possibility of the project taking longer than it should. Once I drew up a true schedule and timeline, including my research, then I would be able to give him a better idea on whether or not his time goals could be met. Reply 2 needed Based on our readings, No, I definitely would not give the executive sponsor an answer at this time. If you were to say yes we could do in 6 months or less, or even a ‘maybe,’ you would pretty much be setting yourself up for failure and giving false hope to the executives. As a PM, I would answer the executive sponsor with “Since this is a new project for the company, I will need to do some research and analyze the project specifics first. Then I prefer to use software in order to accurately calculate everything and come up with the best possible timeline for you.” Reply 3 needed Based on the scenario that has been given I would not be able to give the executive sponsor an answer because I have not yet analyzed the project. What if I gave the answer of 6months and saw the project afterwards but then realized I made a mistake.
  • 6. Well, if it were a lower duration maybe that is good but if it were more time to consume that when the little problem comes since the answer has already been given. I think the way I would phrase it to him is : "I'm currently the new appointed PM for this major project, I have not yet gotten a chance to look at it, but I will let you know as soon as possible what the duration time will be after the planning and scheduling have been settled". I would expect him to be understanding and say "indeed not a problem, just email me or let me know when you do get the chance." I think this is the way I would have handled it because I work for a hotel, and I have many of these projects handed to me, I usually answer the way I did and 9/10 I get the answer that I was expecting. On the other hand, I think it would be perfect after reviewing the project to create deadlines and plan the delivery of the projects so that we know the duration that should be estimated. By having the effort, duration and the elapsed times for the planning of the project, I think that it could be accomplished with a good amount of months. With this, you can give the executive a great answer. Reply 1 needed John, Seems you developed a vast understanding of how real cyber attacks are. In saying that, I would venture to say that you will agree administrations must take the necessary measure to combat cyber attacks. Based on the high level targets that have been successfully infiltrated, clearly no one is exempt from being attacked. The proper handling of government data is very important. Government employees must be aware of how information should be cared for based on it's sensitivity. All agencies should be manned with a cyber security team who are responsible for training all data custodians as well
  • 7. maintained security features. R, E.W. Reply 2 needed I thought we were supposed to answer the question of our administration would ensure that Digital Government services are secure? · What is meant by "Digital Government services?" (previously called "e-Government" services) · Where have past administrations fallen short in protecting Digital Government / e-Government services? · What is meant by "Threats" (i.e. individual hackers, politically motivated hacktivists, criminal enterprises, and unfriendly "nation state" actors) I feel like the questions for the debate were not answered. Growth has been observed in the Information Technology field since the 1940s. Now, in more modern times, the role of E- government, or virtual government has been on the rise. This is providing the American people an open platform allowing for the use and re-use of government data while preserving privacy in the process. (Office of Management and Budget, 2016) Privacy is paramount in this process; the people won't trust the government with data, if they feel the data is not protected. That being said, the government is taking stride to anonymize data, especially when we are discussing health data, PII, or tax data. We have seen that between "January 1, 2009 and May 31, 2012, there have been 268 breach incidents in government agencies with more than 94 million records containing personally identifiable information exposed." (Data Breaches, 2012) Threats come in many forms: malicious software, nation state actors (people who are working for adversaral governments), hacktivists (hackers with a cause), etc. Threats are what we can expect to exploit vulnerabilities in computer systems. You did mention some of this, but I feel you touched the tip of
  • 8. the iceberg. Digital government services are built three "layers": the information, or data, such as weather and census data plus other supporting data, the platform by which data is delivered and managed for access by people, and the presentation layer, which determines the way in which people see the and receive the data through the Internet, mobile applications, and other delivery methods (Office of Management and Budget, 2016) These layers are functional in that they are designed to facilitate the development of open government through the use Internet - based media functionality. The problem lies with the number of breaches that occur constantly. Hopefully, the Data Security and Breach Notification Act of 2015, will help enforce disclosure of breaches when they happen. (Nelson, 2015) Because there have been 268 breaches recorded between the beginning of 2009 and 2012 where we have seen the breach of personal information, we need to be vigilant in mitigating them. Even a breach by Russian hackers exfiltrating information from the Democratic national Convention just was reported; information regarding presidential candidates was stolen. Can you tell us how past administrations failed at securing services? P.S. I am not trying to be rude by any means; I simply did not feel the questions were answered here. If you feel I misunderstood your viewpoint, then help me to better understand. Reply 3 needed Incident response is a piece of the cyber security puzzle, but it is worthless unless you do it in a timely fashion. Creating a culture of security awareness is imperative to creating a defense in depth strategy for enterprise networks. Users are the weakest link in this, and attackers will frequently exploit them. Many breaches stem internally from people's ignorance or being careless with opening email or sharing passwords.
  • 9. (Abawajy, 2014). This can easily result in a breach of any network, whether intentional or not. I have personally seen this in action; mostly because people do not understand what they are doing when they are clicking things while browsing the Internet. Likewise, one user can bypass all the security mechanism present on a network. Check out "(http://www.theregister.co.uk/2010/01/14/google_china_attack _analysis/)." (Grauer, 2016) “Failing to deliver the cyber risk information that board members want, in a way they understand, will not go unnoticed,” said Ryan Stolte, Chief Technology Officer and Co-Founder of Bay Dynamics. And there will be repercussions. 59 percent of board members surveyed said that there is a good chance that one or more IT and security executives who fail to provide useful and actionable information in their reports would lose their jobs. So if that wasn't enough motivation, there are guides that can be obtain from NIST to guide you on create secure configurations for computer systems and servers. You can also access iase.disa.mil to get information on Secure Technical Information Guides (STIGs) to assist in endeavors like this as well. Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 236-247. Grauer, Y. (2016). Forbes Welcome. Forbes.com. Retrieved 14 June 2016, from http://www.forbes.com/sites/ygrauer/2016/06/14/cyber-security- executives-need-to-step-up-their-game-heres- why/#d8c3ea43be1a Digital Government, also know an E-Government is the government’s way of making government data easily assessable
  • 10. through Internet Technology (I.T.). Digital Government also aids and encourages the interaction between citizens and government agencies as well as allows agencies to provide easy, efficient government services to customers (107th Congress, 2002). With the convenience of massive amounts of easily accessible government data comes the need for cyber security to protect from threats. A cyber security threat is any malicious entity that can directly cause or influence the lost, theft or misuse of secured data. These threats can be launched from various sources, e.g., common hackers, insider threats, criminal enterprises (ICS-Cert, 2016). As an administration we will ensure digital government services are secure by first developing an engrained understanding of the potential threats. After such, we will establish the necessary security mechanisms to combat these threats and employ maintainers to ensure our security methods are updated and remain effective. We will constantly monitor potential threats and adjust/upgrade our security measure to defend all new threats. We will ensure handlers of information are trained and cognizant of how to properly receive, distribute and maintain government information. In addition all employees will be able to recognize any system behavior that may imply the system is under attack. We will ensure reporting procedures are well known amongst all handlers of government information. We will emphasize and enforce the requirement to report all security breaches in a timely manner and conduct rehearsals on system recovery procedures. In the past, seemingly in an attempt to conceal the information, administrations have delayed reporting security breaches. In a 2014 Computer World article, Darlene Storm wrote about hacked government agencies. These agencies included the White House, USPS and NOAA. All of the aforementioned had unexplainable delays in reporting cyber security breaches (Storm, 2014). When administrations fail to immediately report data breaches they risk the chance of hackers doing more damage. The sooner the violation is
  • 11. reported the sooner a solution can be implemented and recovery can begin. References 107th Congress. (2002, December 17). Retrieved from National Institute of Standards and Technology: http://www.nist.gov/director/oism/upload/PL107-347.pdf ICS-Cert. (2016). Cyber Threat Source Descriptions. Retrieved from ICS-Cert: https://ics-cert.us-cert.gov/content/cyber-threat- source-descriptions Storm, D. (2014, November 17). List of hacked government agencies grows: State Department, White House, NOAA & USPS. Retrieved from Computer World: http://www.computerworld.com/article/2848779/list-of-hacked- government-agencies-grows-state-department-white-house- noaa-and-usps.html How will your administration ensure that Digital Government services are secure? First, my administration will not hide breaches, once they are identified. We see that with the NOAA hack, Representative Wolf, stated "NOAA told me it was a hack and it was China." (Storm, 2016) Representative Wolf goes onto say NOAA covered up the breach as well. (Storm, 2016) I would set forth an initiaive to push through the Data Security and Breach Notification Act of 2015 to hold agencies accountable in the case of breaches when they occur. This presents a clear and present danger to government services as they provide information and services to the American citizens. Digital government services are built three "layers": the information, or data, such as weather and census data plus other supporting data, the platform by which data is delivered and managed for access by people, and the presentation layer, which determines the way in which people see the and receive the data through the Internet, mobile applications, and other delivery methods
  • 12. (Office of Management and Budget, 2016) We have seen that between "January 1, 2009 and May 31, 2012, there have been 268 breach incidents in government agencies with more than 94 million records containing personally identifiable information exposed." (Data Breaches, 2012) Threats come in many forms: malicious software, nation state actors (people who are working for adversaral governments), hacktivists (hackers with a cause), etc. Threats are what we can expect to exploit vulnerabilities in computer systems. Digital government services are meant to be open platform to provide the American people with information in a way that allows for the creation of data once, then allowing agencies to collaborate to generate consistent data for people to access while preserving privacy throughout the process. (Office of Management and Budget, 2016) One way this is accomplished, agencies are using tools to tailor services to the needs of users and tools help people to complete complex forms, such as FAFSA forms, reducing form completion time by 66%. (Keller & Zinner, 2015) This is done through the use of Application Programming Interfaces, or APIs. (Office of Management and Budget, 2016) Also, mobile is quickly transforming the way data is delivered as well; "By 2015, more Americans will access the Internet via mobile devices than desktop PCs." (Office of Management and Budget, 2016) The challenge lies in the ability of the government to provide the public with data quickly and securely. As we have seen just in the past few years, various government agencies have been breached, and millions of personal records have been compromised. Past administrations seem to have failed in establishing a breach and notification standard, making agencies or other entities accountable for breaches, and enabled the abilities of agencies to better share threat-based information (Government Accountability Office, 2016) Now we have the Data Security and Breach Notification Act of 2015, introduced to require notification of breaches within the government, which
  • 13. also specifies criminal penalties of fines, jail time, or both, for not admitting to breaches causing economic damage to people. (Nelson, 2015) This will help to enforce the standards of notifications of breaches to better inform the public to enhance government relationships with the public. Hopefully, this will lead to better interagency threat knowledge sharing as well. Legal challenges present issues between agencies to allowing agencies to share this important information; these barriers need to be removed to enable agility in securing digital government services. REFERENCES Data Breaches in the Government Sector. (2012). Retrieved 14 June 2016, from https://www.rapid7.com/docs/data-breach- report.pdf Government Accountability Office,. (2016). Privacy in the Digital Age: Preventing Data Breaches and combating cyber crime.. Washington, D.C.: U.S. Government Publishing Office. Keller, E., & Zinner, C. (2015). Streamlining Government Services in the Digital Age. Public Manager, 44(2), 29-30. Nelson, B. (2015). S.177 - 114th Congress (2015-2016): Data Security and Breach Notification Act of 2015. Congress.gov. Retrieved 14 June 2016, from https://www.congress.gov/bill/114th-congress/senate-bill/177 Office of Management and Budget. (2016). Digital Government: Building a 21st Century Platform to Better Serve the American People. Whitehouse.gov. Retrieved 14 June 2016, from https://www.whitehouse.gov/sites/default/files/omb/egov/digital -government/digital- government.html Storm, D. (2016). List of hacked government agencies grows: State Department, White House, NOAA & USPS. Computerworld. Retrieved 14 June 2016, from http://www.computerworld.com/article/2848779/list-of-hacked- government-agencies-grows- state-department-white- house-noaa-and-usps.html