See word doc for details.
Cybersecurity Information Technology
*** 400 words and at least 2 references for “
” and 400 words and at least 2 references for “
Compare the seven-step Cyber Kill chain to the six-step and five-step cybersecurity life cycles. Determine what, if any, are the real differences. What is unique about each approach? Would they be considered prevention-centric or response-based strategies? Explain your rationale.
Discuss a scenario where hackers disrupted crucial information systems (i.e., financial market, electric grid, or defense system) that would justify the federal government shutting down the Internet. Discuss whether the federal government should have the authority to shut down the Internet in an emergency. Explain your rationale, providing supporting evidence.