Learn About Cybersecurity Capacity Building By Collett R

Learn About Cybersecurity Capacity Buildingread Collett R

Step 1: Learn About Cybersecurity Capacity Building Read: Collett, R., & Bampaliou, N. (2021). International cyber capacity building: Global trends and scenarios. In this report, the authors discuss the findings of an international research study, sponsored and supported by the European Commission. The purpose of this study was to identify trends in cyber capacity building and included information derived from interviews with subject matter experts representing 50 organizations from around the world (See Annex 1. List of Interviews).

Secondary data was obtained from public sources including government and organizational websites and document repositories. Read: Ramim, M. M., & Hueca, A. (2021). Cybersecurity capacity building of human capital: Nations supporting nations. Online Journal of Applied Knowledge Management, 9(2), 65–85.

In this article, the authors discuss a cybersecurity capacity building framework and the roles that various nations and organization play in helping build cybersecurity capacity on a global basis. Step 2: Research International Cooperation and Joint Efforts to Improve Global Cybersecurity The resources listed below provide information about current international efforts to improve global cybersecurity through cooperation between nations through projects involving businesses, governments, nongovernmental organizations, and individuals. As you review these materials, focus on the benefits of cross-border cooperation for the purposes of combating cybercrime, cyberattacks, and cyberterrorism. Continue your research by identifying additional, international efforts to promote cybersecurity capacity building. · Government to Government Cooperation to Improve Global Cybersecurity · The Commonwealth Telecommunications Organization: and · Commonwealth Approach for Developing National Cybersecurity Strategies · United Nations International Telecommunications Union (ITU) Guide to Developing a National Cybersecurity Strategy · Global Cooperation for Cybercrime Prevention · Budapest Convention on Cybercrime · INTERPOL · Public-Private Partnerships and Their Use to Solve Global Problems · FIRST: Improving Cybersecurity Together · Recruiting and Deploying Volunteers as Cyber Experts (Example Programs) · Step 3: Discuss Cultural Issues as Potential Barriers to Success in Cyber Capacity Building Participate in a discussion with your peers about cultural issues as potential barriers to success in international cooperative efforts.

Use examples from your reading and research for Steps 1 and 2 along with information from the following resources: · Step 4: Discuss Ethical Issues as Potential Barriers to Success in Cyber Capacity Building Read: Ethics and Ethical Decision Making. Participate in a discussion with your peers about ethical issues as potential barriers to success in international cooperative efforts. Use examples from your reading and research for Steps 1, 2, and 3 along with information from additional sources from your personal research. Ground your discussion in one or more of the ethical theories or principles discussed in the learning topic Ethics and Ethical Decision Making. Step 5: Research the Use of Training and Certifications to Build Cybersecurity Capacity. In this step, you will continue your research and analysis of cyber capacity building by examining the role that training and certifications play in the development and growth of a professional cybersecurity workforce for nations around the world.

Begin by reading these scholarly articles: BlažiÄ, B. J. (2021). The cybersecurity labour shortage in Europe: Moving to a new concept for education and training. Technology in Society, 67. Furnell, S. (2021). The cybersecurity workforce and skills. Computers & Security, 100. International organizations such as CompTIA, EC-Council, ISACA, and the Information Systems Security Consortium play a large role in training and certifying cybersecurity professionals. Certifications include: Cisco CCNA-Security, CCNA Cyber Ops; CompTIA Security+, Network+, CASP; EC-Council CSCU, CEH, CHFI, CTIA, C|CISO; ISACA CISA, CISM, CRISC; (ISC)2 CAP, CISSP, CSLP, SSCP; and others related to business, risk management, disaster recovery, and OS administration.

Consider the value of these certifications to nations as potential solutions to the need for professionalization of the cyber workforce. Step 6: Prepare an Annotated Bibliography Choose the 10 best sources from your searches for articles, papers, and dissertations. For each source, write an APA citation and a two- to three-sentence annotation discussing the source’s content, how you plan to use it in your paper, and its utility or quality. Organize the list alphabetically and number the entries. Submit your annotated bibliography for review and feedback from your instructor.