Vulnerabilities of Byob

Submitted by: Submitted by

Views: 145

Words: 4895

Pages: 20

Category: Science and Technology

Date Submitted: 07/05/2014 05:04 AM

Report This Essay

TA#2 Human Factors and Cyber Policy 

CSEC 620

April 27,2013

Table of Content

Introduction

Copyright, threats and ownership of intellectual property

-Important Security Issues

-Recommended Policy Controls

-How/Why Human Factors Influence Policy

Meta-Data collected and used by the Private sector and Public sector

-Important Security Issues

-Recommended Policy Controls

-How/Why Human Factors Influence Policy

Zero Day Exploits employed for economic or military advantage

-Important Security Issues

-Recommended Policy Controls

-How/Why Human Factors Influence Policy

Vulnerability assessments for Mobile Devices in the BYOD environment

-Important Security Issues

-Recommended Policy Controls

-How/Why Human Factors Influence Policy

Conclusion

Introduction

Human factors can influence policy choices for both domestic and international cybersecurity issues.  What will be discussed in this paper is how human factors can affect four selected cybersecurity issues.  The four-cybersecurity issues selected are zero-day exploits, meta-data collected and used by private and public sectors, vulnerability assessments for mobile devices in the BYOD environment, and threats to copy right and ownership of intellectual property.  This paper will go into details on important security issues, recommended policy controls, and how or why human factors can influence each of the recommended policy controls for each of the four selected topics mentioned.  

Copyright, threats and ownership of intellectual property

Important Security Issues

With the proliferation of 3-D Printers and the availability of copyrighted materials posted online, there is an additional facet to the current debate surrounding copyright and ownership of intellectual property. Piracy of digital media such as music and videos has been a long-standing issue since the 1990’s with Napster and similar peer-to-peer file sharing programs.

There are six ways that intellectual...