Remember to be clear about what action you are recommending. Executive management will want to understand not only what you discovered, but also what you propose as a solution. The company’s leaders will want to know what decisions they need to make based on your findings. Give them the actionable information they need to decide.
You may want to review these presentation resources to help you with your narrated presentation. You will provide voice annotation for all slides in the following format:
five to 10 slides maximum; limit bullets to no more than six per slide
voice annotation for every slide (excluding the reference slide)
a reference slide with one to two quality sources
How Will My Work Be Evaluated?
As you progress in your cybersecurity career, you may find yourself making presentations to customers, client audiences, and management. By summarizing your results and recommendations to management in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your recommendations to provide information for decision makers in a format that uses the right mix of technical detail in a business context is an important workplace and career skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.
2.1.3: Explain the significance of the issue or problem.
12.3.2: Describe the implementation of controls.
12.8.1: Recognize the process to obtain approval from the business process owner.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
Identify a hurricane or significant winter weather event that occurred over the past 10 years. 2. Choose an emergency management or homeland security related agency that was affected by this event and assume the role of an employee in the Public Information Unit. 3. Following the format below, write a public information release on the impending storm. The memo should focus on access and functional needs populations within the agency’s jurisdiction. Based on your research, offer preparedness information and advice for these populations.
1.Think about how you would feel if there were no rules regarding how your credit card information was stored on merchants’ websites. Consider whether you would purchase items online. Would the Internet be as big as it is today if we had no laws or information security policies regarding data that makes up an e-commerce transaction? Provide rationale for your answer.
- Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want using company-owned personal computers. Could this cause a problem for the organization? Why or why not?
Questions Second part:
- What is an advantage of organizing IT security policies by domain?
- What is a disadvantage of organizing IT security policies by domain?
- Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.
e read the HBS case “Mortgage Backed Securities and the Covid-19 Pandemic” and the
Goldman Sachs research note on Canvas. There are also links to several contemporaneous
Question 1. Suppose you bought the particular security described in Exhibit 9a-k
of the case (whose coupon interest rate is 3%) for a price of 106% on April 1, 2020.
Because the Federal Reserve has drastically cut interest rates, a wave of refinancing by
homeowners is expected. Compute your internal rate of return under the assumption
that 1/3 of the principal is repaid by homeowners who refinance their mortgage and 1/3
is repaid by the guarantor (the government agency) because the borrowers default due
to Covid-related loss of income. Assume these repayments all happen on 10/1/2020
and that all the remaining principal is repaid on 10/1/2021 due to further refinancing
and defaults. Under this scenario, are the bonds a good investment?
NOTE: For this question, you do not need to compute the scheduled amortization payments on the loan pool. Just assume you get monthly coupon payments, with principal
repayment as described above.
Question 2. As the case describes, investors in MBS will lose money if interest rates
go up. But in early 2020 this seems unlikely for the near term, given the Fed policy.
However the case does not mention any other pandemic related mechanisms that could
affect bondholders. In what way do you think investors in April 2020 were exposed to
the direction of U.S. house prices? Can you think of other factors that may determine
the return of MBS during or after the pandemic?
Question 3. The CARES Act passed by the U.S. government in response to the
pandemic gave any homeowner with a mortgage that was held by an agency-backed
bond trust the right to 12 months of forbearance, meaning all payments of principal
and interest could be suspended without triggering default.1 Suppose you were such
a homeowner in 2020 and that the interest on your mortgage is 3.75% payable over
the next 30 years. You have not lost your job, and you do have enough income to pay
your expenses. You have an option to (i) costlessly repay your mortgage and enter in
to a new one with 2.75% interest, or (ii) put your current mortgage into forbearance.
1At the end of forbearance, the mortgage terms remain unchanged. The missed payments – both principal
and interest – have to be repaid as a lump sum at maturity, or whenever the loan is refinanced or the home
(Assume you cannot refinance your loan while it is in forbearance. You also cannot
refinance and then put the new loan into forbearance.) How would you decide which
option to exercise?
Question 4. Now consider the bondholder in Question 1 again. Assume that all the
loans that would have otherwise defaulted in 2020 are instead put into forbearance,
and that they are all either refinanced or go into default on 10/1/2021. The guarantor
will make all scheduled payments to bond holders for loans in forbearance. What is
your internal rate of return now? In early 2021, the U.S. government was considering
extending the program for an additional 6 months. Would you favor this or oppose it?
Write a short essay around 500 words about how the choice of referent objects for security concerns
Part 1 – Select a domestic or international terrorist organization that threatens the U.S. homeland and complete a profile of that organization. Your topic does not have to be approved by the instructor unless otherwise noted. If you have any questions, please contact your instructor. The group profile should be approximately 50 percent of the final paper and must include a discussion of the group’s ideology, targeting, tactics, capability, and overall goals, analysis of attacks, and any statements or propaganda released by the group. Make sure you have enough information on the group to address all these factors and how it affects the US homeland.
A foreign terrorist group for this project must be on the official list of foreign terrorist organizations (FTOs) maintained by the U.S. Department of State. In the case of domestic terrorist groups, there is no sanctioned list from which to choose, but the Federal Bureau of Investigation (FBI) has made significant arrests from several groups that would fit the description of a domestic terrorist group. The FBI also names many other groups in congressional testimony. Materials presented in the course as well as recent news and congressional testimony, are good sources of information on how to identify domestic groups for this project.
Part 2 – Approximately 50% of the entire research paper. Use the group profile to conduct an analysis of one or more U.S. homeland security policies studied in the course, to assess the ability of the policy or policies to counter the threat posed by the group profiled. This analysis should begin with an introduction and explanation of the policy, followed by an analysis addressing the breadth of the information (from part 1) gathered on that terrorist group. The policy you analyze should be consistent with the group; for example, if you choose a domestic terrorist group, it would be improper to analyze the Secure Border Initiative and its ability to counter a domestic threat, because the members of the group are already within the nation’s borders. If you find the policy deficient, make specific recommendations for policy change to counter the threat. If you deem the policy sufficient to counter the threat, explain the rationale for your conclusion.
Your finished project, including both elements of the paper, should be approximately 12 to 14 double-spaced pages (full pages), (not including cover page, charts, graphs, pictures, graphics, or reference pages) but including the abstract, submitted as one document. Make sure you present an introduction and a conclusion tying together both aspects of the paper. The final term paper must be formatted as follows:
• Title Page (does not count as part of the page requirement)
• Abstract (Heading)
• Part 1 (Heading): Identify the Terrorist Group
-Group’s Profile (Sub-heading)
-Group’s Ideology (Sub-heading)
-Group’s Targeting (Sub-heading)
-Group’s Tactics (Sub-heading)
-Group’s Capabilities (Sub-heading)
-Group’s Overall Goals (Sub-heading)
-Group’s Analysis of attacks (Sub-heading)
-Group’s Released Statements or Propaganda (Sub-heading)
• Part 2 (Heading)
-Identify one or more homeland security policies (Sub-heading for the specific policy or policies)
-Assess the ability of the policy or policies to counter the threat posed by the group profiled (Sub-heading could be “Policy Assessment, etc.”). In this assessment and/or analysis must include an introduction and explanation of the policy, followed by an analysis addressing the breadth of the information (from part 1) gathered on that terrorist group.
-References (Sub-heading)((does not count as part of the page requirement)
What security risks are associated with internet connected devices?
Should cyberspace be treated as a potential battlefield?
Must freedom of speech and association in cyberspace be sacrificed for cybersecurity?
Write a paper exploring themes at the intersection of technology and policy. Select one of the following topics:
• Methods for reducing the level of international cybercrime
• Coping with the fragility of and lack of security on the Internet
• Establishing norms of national behavior in cyberspace, in peace and conflict
• Developing national legal support for norms
• The role and importance of declaratory national policies for cyberspace
• Creation of international risk mitigation frameworks
• Development of strategies that encourage international agreements
• Assess the risk of catastrophic attacks on national infrastructure.
• Should cyberspace be treated as a potential battlefield?
• Explore the impact of commercial cyber-espionage on advanced economies.
• Contrast European and American approaches to privacy on the Internet.
• Explore freedom of expression via the Internet within autocratic regimes.