Expert answer:Critical Anyalsis of businesses participate in Pub

Answer & Explanation:Can someone help me with writing a critical analysis for each case study below and include 3 references in APA format, also please follow the below rubric:Rubric: Critical Analysis.docxCase Study 1: Why Should Businesses Participate in Public 1.docxCase Study 2: Case Study 2 PPP.docx
why_should_businesses_participate_in_public_1.docx

case_study_2_ppp.docx

critical_analysis.docx

Unformatted Attachment Preview

Why Should Businesses Participate in Public-Private Partnership for
Cybersecurity?
Gregory S Brown
December 6, 2015
Introduction
Our consulting firm has been hired to help a large regional utility company
understand the public-private partnership concept. They were approached
by a federally funded research and development organization (FFRDC),
which is recruiting companies for participation in government initiated
public-private partnerships designed to improve cybersecurity for the
energy sector. The company distributes both natural gas and electricity
across a three state area that includes both urban and rural households
and businesses.
To help the utility company understand the public-private partnership
concept, we will research and write an issues brief which addresses this
concept, the types of cybersecurity improvements which could be
addressed by such a partnership, the potential benefits to industry
partners, and the potential risks and/or costs in resources.
Public-Private Partnerships (PPP) have many definitions due to the
differences in how the different states define PPPs, there is no standard
PPP definition. “The PPP Knowledge Lab defines a PPP as “long-term
contract between a private party and a government entity, for providing a
public asset or service, in which the private party bears significant risk and
management responsibility, and remuneration is linked to performance”.
PPPs typically do not include service contracts or turnkey construction
contracts, which are categorized as public procurement projects or the
privatization of utilities where there is a limited ongoing role for the public
sector (PPPIRC, 2015). The relationship between private companies and
government agencies can be used to finance, build and operate projects
like public transportation network, parks and convention centers and in this
case natural gas and electric projects. PPPs are often used to use privatesector investments to finance public projects when sufficient public funding
is not available. The private sector receives a higher rate of return on
investment than the government, because they assume most of the
projects risks and responsibilities and the government for their part raises
money by issuing bonds, but at a lower interest rate due to the longer
terms of the investment. The laws governing PPP must be consistent with
the laws and regulations of the state or country where the project is being
created. In this instance, the PPP laws are created by the state where the
partnership is being considered.
Analysis
When we look at Public-Private partnerships for Cybersecurity, the
Intelligence and Nationals Security Alliance (INSA) convened a group of
government and industry experts and they determined that “An effective
public-private partnership for cyber security would provide the abilities to
detect threats and dangerous or anomalous behaviors, to create more
secure network environments through better, standardized security
programs and protocols and to respond with warnings or technical fixes as
needed (INSA, 2009)”, this helps the company in that they can partner with
government to create a more protective, secure environment.
Overview
Over the past few decades, the energy sector has become increasingly
dependent on digital technology to reduce coast, increase efficiency, and
maintain reliability. Because of this, Information Technology (IT) and
industry control systems (ICS) are vulnerable to malicious attacks and
misuse (Huffman, 2012). The impact from an extended outage of gas and
electricity can be extremely dramatic, especially since power grids are
interdependent of each other, water, telecommunications, transportation,
gas and electricity. Just like the malware attacks discovered on the
centrifuges of the Iranian Programmable Logic Controllers (PLC) used to
enrich uranium this type of attack can happen to ICS. To combat this and
other threats to the grids, the US Government has set up numerous efforts
to help protect the US from cyberattacks. “There is the Department of
Energy’s Cybersecurity Risk Information Sharing Program (CRISP) and
the Department of Homeland Security’s National Cybersecurity and
Communications Integration Center (NCCIC) programs in which utilities
voluntarily share information that allows patterns and methods of potential
attackers to be identified and securely shared (McElfresh, 2015)”.
Therefore, it helps the company to engage in a partnership with the
government.
Some of the types of activities which the utility company could reasonably
be expected to contribute are information sharing. This helps develop the
cybersecurity program to protect the energy sectors critical infrastructure.
An example is sharing risk, vulnerability and threats specific to the energy
sector to the government so a comprehensive plan can be created to
protect and secure the collaboration. Maturity models which are a good
way to measure progress. They recognize that meeting the maximum
security levels immediately is not necessary in the beginning, but should
be the end state. “The departments of Energy and Homeland Security
partnered with dozens of energy companies to develop a comprehensive
maturity model, designed to identify and combat threats in that industry
(Hight, 2013)”. Thru the use of sharing threats and utilizing maturity models
the company helps industry and the government share and understand
risks. This helps in the planning, research and development of the
cybersecurity collaboration between public and private partners.
Benefits
Some of the benefits to the company by participating in this venture are the
company can generate revenue in tolls and user fees once the project is
completed and ready for use. The company can allocate many of the risks
it assumes, like design, construction and operating and maintaining
expenses. Longer loan maturities, which helps the company in that it
allows enough time for the project to generate a profit which can be used
to repay the loans. Other benefits are the protection of the government in
the event of an attack, the company can not only use their own protection
and security methods, but they also have access to the government’s
protection methods. They also have the protection of the government if the
event of law suits or litigation.
Summary and Conclusion
Our recommendation is that the company should pursue the public-private
partnership that is designed to improve cybersecurity for the energy sector.
As a distributor of both natural gas and electricity across a three state area
that includes both urban and rural households and businesses, the
company can benefit from this partnership with the government in that the
company can transfer risk to the government, they’re still able to generate
a profit over an extended period of time in fees and tolls where as it would
have been more expensive to undertake this endeavor alone and they can
leverage the governments protection and security methods
References
(2015, October). Find it @ PPPIRC. Public-Private Partnership in
Infrastructure Resource Center. What are Public Private Partnerships?
Retrieved from: http://ppp.worldbank.org/public-privatepartnership/overview/what-are-public-private-partnerships
Townsend, F. (2009, November). INSA. Intelligence and Nationals Security
Alliance. Addressing Cyber Security Through Public-Private Partnership:
An Analysis of Existing Models. Retrieved from:
http://www.insaonline.org/i/d/a/Resources/Addressing_Cyber_Security.asp
x
Huffman, P. (2012, May). DOE/OE-003. Electricity Subsector
Cybersecurity. Risk Management Process. U.S. Department of Energy.
Retrieved from:
http://energy.gov/sites/prod/files/Cybersecurity%20Risk%20Management%
20Process%20Guideline%20-%20Final%20-%20May%202012.pdf
Hight, E. (2013, Apr). Washington Technology. Forging a public-private
partnership for cybersecurity. Government, private sector collaboration key
to forward-looking security. Retrieved from:
https://washingtontechnology.com/articles/2013/04/30/insights-hight-cyber-
collaboration.aspx
(2015, October). Find it @ PPPIRC.Government Objectives: Benefits and
Risks of PPPs. Potential Benefits of Public Private Partnerships. Retrieved
from: http://ppp.worldbank.org/public-private-partnership/overview/pppobjectives
Reuters, T. (2013). Practical Law Company. Public Private Partnerships:
Issues and Considerations. Practical Law Finance
McElfresh. M. (2015, June). Scientific America. The Conversation. TSCH.
Power Grid Cyber Attacks Keep the Pentagon Up at Night. A detailed look
at why computers running the U.S. electrical infrastructure are so
vulnerable to digital threats. Retrieved from:
http://www.scientificamerican.com/article/power-grid-cyber-attacks-keepthe-pentagon-up-at-night/
Case Study 4
Why should businesses participate in Public-Private Partnerships
(PPP) for Cybersecurity?
Submitted by:
Cybersecurity in Government Organizations
05/12/2015
Overview
The combined effort of the private organizations and the
public sectors such as federal, state, and local government will
better serve the general public in their daily life. The PublicPrivate Partnerships (PPP) is the contract between the public and
the private party that’s allows them to share the assets and skills
among each other to provide better products and services to the
general public. The PPP can be seen in many ways such as
building public transportation system like bridges, roads or parks,
convention centers, healthcare facilities, schools, etc. In most of
the PPP, the private sectors always invest on the public project to
complete the mission in exchange of receiving the profits once the
project is completed and starts its operation. The involvement of
the private sector will bring the creativity, efficiency, and capital to
complete the complex public project. Although there is no clear
defined rule or the law to define the partnership, the United
Nations Commission on International Trade Law (UNCITRAL)
founded in 2001 provide the legal framework to facilitate the
accomplishment of the PPP projects. The Transportation
Infrastructure Finance and Innovation Act of 1998 define the
public -private partnership in building the public transportation
with private sectors fund.
Public-Private Partnerships in cybersecurity
Energy sector is one of the major sectors targeted by the
cybersecurity hackers. In 2014, Industrial Control Systems Cyber
Emergency Response Team (ICS-CERT) reported that the largest
portion (32%) of the 245 cybersecurity incidents to which the
organization responded involved the energy sector. One of the
security measures the company will implement is to control the
unauthorized access to energy sector networks. Strong
authentication, SSL/TLS encryption and limit on internet access to
vital resources will be applied where and when necessary. Another
security measure will be auditing the web application. Hackers try
to gain the access to the network through the web application that
was infected by the malware or viruses. Some of the web
applications will have the inbuilt malware and when come in
contact with the network, poses the security threat. So, whether the
web application was self-built or purchased from the vendor, it
needs to be checked for the vulnerabilities. Another measure will
be training the end users about various online scams like phishing
and spear phishing by which hackers try to access the company’s
information. Providing training to the employees about various
cybersecurity principles and features will prevent any unintentional
network vulnerabilities. Above mentioned are the three types
cybersecurity activities that the company is expected to contribute
to.
Benefits and Risks
The Utility Company is likely to have benefits from the
Public-Private Partnerships. The company will provide its
employees and its products to enhance the cybersecurity measures
in the federal government and in exchange the utility company will
make percentage of profit from the federal government. In the long
run, the company will get more contracts from the government
because of its trusted and effective service to prevent the
cyberseurity data breach. Since no one can guarantee 100 percent
in their job, the company could expect the risk to lose millions of
dollars if the cybersecurity system fails. Also, the exposure of the
company’s operation to the federal government is another risk.
Another risk will be kicked out of the partnership because of not
completing the task of providing security to the network.
Recommendations for Best Practices
In order to make the PPP more effective, clear guidelines
must be written in order to check the performance of the work and
defining the purpose of the partnership. A clear defined revenue
stream must be written which shows the acceptable rate of return
over the term of partnership. Receiving support from all the
stakeholders is very important in order to minimize the potential
resistance in establishing partnership.
References:
Baxter, J. (2009, November). Recommendations and Model. Retrieved
from Addressing Cyber Security Through Public-Private
Partnership: a.
http://www.insaonline.org/CMDownload.aspx?ContentKey=e1f31b
e3-e110-41b2-aa0c-966020051f5c&ContentItemKey=161e015c670f-449a-8753-689cbc3de85e
Diaz, A. (2012, August). Best practices for cyber security in the electric
Power Sector. Retrieved from Energy and Utilities: http://www-
01.ibm.com/common/ssi/cgibin/ssialias?infotype=SA&subtype=WH&htmlfid=EUW03064USEN
Leithauser, T. (2011). ENISA: PUBLIC-PRIVATE PARTNERSHIPS CAN
BENEFIT FROM ‘BEST PRACTICES’. Cybersecurity Policy
Report, 1.
Manley, M. (2015). Cyberspace’s Dynamic Duo: Forging a Cybersecurity
Public-Private Partnership. Journal of Strategic Security, p85-98.
Spaulding, S. (2014, February 12). DHS Launches the C³ Voluntary
Program, A Public-Private Partnership to Strengthen Critical
Infrastructure Cybersecurity. Retrieved from Department of
Homeland Security: http://www.dhs.gov/blog/2014/02/12/dhslaunches-c%C2%B3-voluntary-program
World Bank Group. (2015, October 03). Retrieved from Public-Private
Partnership in Infrastructure Resource Center:
http://ppp.worldbank.org/public-private-partnership/overview/what-arepublic-private-partnerships
Critical Analysis & Discussions Rubric
On-Time Posting
Critical Analysis #1
Critical Analysis #2
Quality of Critical Analyses
Quality of Critical Analysis #1
Quality of Critical Analysis #2
References for Critical Analyses
References in Critical Analysis
#1
References in Critical Analysis
#2
On Time
10 points
Posted first critical analysis of another
student’s Case Study before 11:59PM
Eastern Time Thursday.
10 points
Posted Critical Analysis of a second
student’s Case Study before 11:59PM
Eastern Time Thursday.
Excellent
20 points
Posted a clear, concise, and thorough
critical analysis of another student’s
Case Study (3 or more points of
analysis).
20 points
Posted a clear, concise, and thorough
critical analysis of a second student’s
Case Study (3 or more points of
analysis).
Excellent
5 points
Includes 3 or more scholarly /
authoritative sources of information in
the response and correctly cites each
reference using in-text citations and a
reference list.
5 points
Includes 3 or more scholarly /
authoritative sources of information in
the response and correctly cites each
reference using in-text citations and a
reference list.
Timing of Comments in Critical
Analysis Threads
Comments in First Critical
Analysis Thread
Comments in Second Critical
Analysis Thread
Quality of Comments to Critical
Analyses
Comments in First Critical
Analysis Thread
Comments in Second Critical
Analysis Thread
On Time
5 points
Completed posting comments to
another student’s critical analysis
before 11:59PM Eastern Time
Saturday.
5 points
Completed posting comments to a
second student’s critical analysis before
11:59PM Eastern Time Saturday.
Excellent
10 points
Posted a complete and coherent
response to a fellow student’s critical
analysis. Fully addresses the student’s
work and adds value to the discussion.
10 points
Posted a complete and coherent
response to a fellow student’s critical
analysis in a second thread (different
from the first). Fully addresses the
student’s work and adds value to the
discussion.

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP