Global Economic Summit

Learning Goal: I’m working on a writing case study and need support to help me learn.

Step: Determine Bad Actors

Your team has learned about the differences in the cyber culture as well as the laws and regulations that exist for the nations at the summit.

In hopes of finding the source of the anomalous network activity, the host of the summit has provided your team with the IP addresses associated with the anomalous behavior.

These IP addresses are unfamiliar, and you need to find out information about them and about their source. The host of the summit has given these IP addresses to each nation’s cybersecurity team to analyze and take steps for defense and remediation of their nation team’s infrastructure. No other information is given.

As a team, you will provide an Attribution Report to the host of the summit, determining the bad actors. This two- to three-page report will be part of your Security Baseline Report.

You are familiar with, and you want to examine the contents of the files, but first you want to determine the source. You need to be sure because any error can have ramifications in international diplomacy. You are also aware of AlienVault Open Threat Exchange and its capabilities for providing attribution for indicators, and additional information on adversaries.

Step: Analyze the International Domain

In the previous step, you developed the security baseline report. In this step, your team will analyze the legal and regulatory aspects of the summit.

The Global Economic Summit will encompass a mix of attack vectors, forensic laws and regulations, the international law of cyber warfare (cyber offensives/warfare) and ethics as you have researched and provided in this project. It is your responsibility to report clear, accurate, and honest research. The mobility of devices and data further complicates the tracking and analysis of international incidents. In the field of digital forensics, you use tools and techniques, such as visual analysis, to look at geospatial information and connectivity hops for tracking mobile devices.

Mobile data, including storage in the cloud (i.e., cloud computing), presents even more robust challenges to the investigator. Considerations include incorporating international jurisdictional issues as well as whether all the data can be recovered, even when it can be accessed.

Using the policy matrix created in previous steps, you and your team members will complete a Digital Forensic Environment Review and Analysis of the international laws and regulations that deal with data acquisition, preservation, analysis, and transfer. This environment review and analysis is the Forensic Analysis Report for this project and will be submitted with the International Standards Report.

From the environment review and analysis, what artifacts (digital certificates, for example) do you see and keep track from the network traffic, and how does this information inform you of the security posture of the communications and information-sharing networks?

Your team should now have enough information to create a comprehensive report demonstrating the legal and environmental position of each country involved. There are standards that each country, as a member of the international community of nations, will have included in its laws and regulations.

Your environment review should be three to five pages in length. Your team will submit this review with your Transnational Legal Compliance report, which you will complete in the next step.

This environment review and analysis is the Forensic Analysis Report for this project and will be submitted with the International Standards Report.

Submit the Digital Forensic Environment Review and Analysis for instructor feedback. Note: This review and analysis is part of the final graded deliverable.

Based on the policy matrix and the environmental review and analysis you developed in previous steps, the team should provide a two- to three-page Transnational Legal Compliance Report itemizing all the compliance requirements that overlap or are similar among all the nations on the cybersecurity task force for the conference. Include a short analysis on how these requirements are consistent (or not) with the Tallinn Manual 2.0 (The manual seeks to address “common cyber incidents that states encounter on a day-to-day basis and that fall below the thresholds of the use of force or armed conflict” (CCDCE, n.d.) Like many declarations of international law, however, it is more aspirational than enforceable. It is neither a treaty nor a convention, but merely an agreement between representatives from several NATO nations as to what the laws governing cyber operations “should be.” It could be used as advisory materials in a domestic court of any of the member nations to resolve a legal dispute, but it is not binding legal authority) on the International Law Applicable to the Conduct of Cyber Operations.

Then, proceed to the next step in the project to identify the critical or key international standards determined in previous steps.

Step: Review Key International Initiatives

Now that you have looked at the regulations used by the other nations, in this step you will consider international initiatives that foster cooperation with each other.

Among the items identified in the Transnational Legal Compliance Report and the policy matrix from the previous steps are certain international initiatives that each country has undertaken to demonstrate cooperation and compliance with other nations.

From the information you have gathered and what you have learned in previous courses, determine as a team which of these initiatives provides the best opportunity for cooperation among all the delegates at the conference.

Your team should develop a two- to three-page International Standards Report. State your sources and support your recommendations with the facts that have been gathered.

Step: Compile the Cybersecurity Policy and Baseline Analysis Report

As a team, you will work together to create a Cybersecurity Policy and Baseline Analysis Report. This report will address the current cyber disposition of legal standing for the Five Eyes (FVEY) country you represent regarding international cyber relations. This final report will be a minimum of 20 pages in length and meet APA standards for writing. Refer to the Cybersecurity Policy and Baseline Analysis Report Instructions for further details of what to include and the general format of the report. Submit your Cybersecurity Policy and Baseline Analysis Report for assessment.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more