Order Number |
9008234567 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
Final Course Project Presentation (Signature Assignment)
You will create a 12 to 15 minute presentation via a PowerPoint® presentation that is set up for automatic transitions of slides with voice narration or a Narrated Video Presentation. You will present an overview of the project and provides the project sponsor with an overall view of the project plan. In some cases, the business sponsor/executive will not have time to read the entire plan, so they would prefer a presentation highlighting the key points of the project. You should include the project baseline start and finish dates for the project. You should also include a short table with the high-level budget that indicates the baseline total planned budget amount for the overall project within your presentation. The following sections and information should also be included.
Textbook:
Johnson, T. A. (2015). Cybersecurity: Protecting critical infrastructures from cyber–attack and cyber warfare. Boca Raton, FL: CRC Press. ISBN: 9781482239225.
Pichtel, J. (2016). Terrorism and WMDs (2nd ed.). Boca Raton, FL: CRC Press. ISBN: 9781498738989.
***MEGAN***
As technology continues to advance and more individuals have access to these advancements, cyber intelligence and counterintelligence need to play an increased role in society as well. For every step that the United States takes towards advancing technology for positive reasons, there are many individuals who develop technology to take advantage of innocent individuals. Therefore, it is the responsibility of the United States’ Government to dedicate time and money to the protection of these individuals.
Information warfare occurs when other countries take information using technology to use against another country with whom they are fighting (Johnson, 2015). Having an enemy gain information that is used in the defense of the United States poses a major problem and needs to be rectified immediately. By increasing the importance of cyber intelligence and counterintelligence, these attacks can be prevented and many innocent lives can be spared. Researchers have indicated that the field of information warfare is very undefined and ever-changing (Molander, et. al., n.d.). One example of information that could be stolen is the location or route that the President is going to take when traveling. If an enemy has this information, they can use it to assassinate the President, which sends the United States into a whirlwind.
Cyberspace continues to grow and expand as technology around the globe does as well. That being said, some form of regulation needs to occur in order to ensure that one country does not gain an upper hand over others. On the home front, the United States must ensure that cyberspace is regulated because the private sector seems to be a weak spot that is often a place of attack for other countries (Siboni & Sevilla, 2019). Therefore, in order to ensure the safety of the country, it should be at the top of management’s decisions to form protection for these elements of technology. One method that has been utilized already to prevent an unfair advantage is the development of formal rules of engagement for cyber wars (Johnson, 2015). Although preventing attacks and wars may not be completely doable, limits can be put in place to ensure that the attacks are not enough to completely destroy another country. On the international level, it becomes harder to regulate the use of technology because different countries have different viewpoints about what is acceptable and what rights individuals have.
In terms of law enforcement using electronic data collection and intelligence, this is a process that is necessary in our changing world. Technology is now used in almost every crime that is committed and therefore should be used in every avenue to solve the crime. Although this poses some problems, there should still be limitations such as obtaining and execution of warrants and privacy laws that allow citizens the rights to still have some protection. Ultimately, the United States has the right to protect its’ citizens but also needs to ensure that protection does not supersede their rights to privacy.
Looking at the Holy Bible, there are some passages that relate to the issues and concerns individuals have about advancements in technology. One passage that directly relates to this issues states, “that the man of God may be perfect, thoroughly furnished unto all good works” (King James Bible, 1769/2021, 2 Timothy 3:17). This passage demonstrates that the Lord is in favor of advancing society and bettering the lives of individuals, but should be done so in a way that is positive, not in a way that takes advantage of others. Ultimately, it is our duty to ensure that the Lord is being honored in every action that we take.