Identify threats to your nation’s communication systems and the potential impact of an exploit.

Global Economic Summit

Description

Complete Cyber Policy Matrix

Cyber Policy Report: The culmination of your policy research, this report should provide your CISO with an understanding of the managerial, technical, and regulatory positions of the FVEY nations attending the summit.

The cyber policy report comprises the following materials developed by you and your teammates throughout the project:

○ Cyber Policy Matrix: A spreadsheet or table that represents a matrix of your FVEY country’s policies and/or laws that the government has

instituted to address cybersecurity management and technology, with a comparison of the other nations’ policies. International laws and regulations that deal with the acquisition, preservation, analysis, and transfer of data will also be included.

○ Transnational Legal Compliance Report: Itemized appraisal of the compliance requirements that are common among the FVEY nations.

○ International Standards Report: A review that determines which international initiative is most likely to result in cooperation from all the nations at the summit.

● Security Baseline Report: This is a comprehensive analysis of networks, tools, threats and vulnerabilities surrounding this event.

The report  comprises three reports: Attribution Report, Network Security Checklist, and System Security Risk Vulnerability Assessment Report.

The following materials are developed by you and your teammates
throughout the project:

○ Attribution Report, in which you identify the rogue nation responsible for the breach document, detail your processes, and
determine the impact to international relationships.

○ Network Security Checklist, an inventory of the network’s software and hardware components used to ensure multilevel security.

○ System Security Risk Vulnerability Report, in which you>

Identify threats to your nation’s communication systems and the potential impact of an exploit.