Cybersecurity
Each answer should be preceded by its corresponding question and number.
2. It is recognized that insecure supply chains represent one of the greatest cybersecurity vulnerabilities across an array of activities — from software development and coding, to COTS application acquisition, and hardware procurement, across a variety of environments from commercial industry, to federal, state and local governments, and national security agencies. Based on everything you have read, in your view, what are the necessary steps that should be taken to minimize or mitigate supply chain vulnerabilities in any any one of these environments?
3. The issue of cybersecurity in federal government contracting is critical. Without securing data that is confidential, the company and agency are unable to continue business. The Federal Acquisition Regulation (FAR) has specific regulations in place to safeguard processes and the data involved. Sometimes, these procedures are in place to protect the company, and sometimes they are to keep information about how to create a product away from the public. However, when contracting with the government in the United States, the FAR requires strict adherence or the contractual agreement’s conditions are in breach. This usually affects both the company’s current prospects with these contracts and future potential work with the government. Briefly describe what you believe are some of the most important FAR clauses pertaining to cybersecurity and why?
4. The Internet of Things (IoT) can be defined as a cyber-physical ecosystem of interconnected sensors and actuators, which enables intelligent decision making. Increasingly, the IoT increasingly affects our everyday lives, from smart cars and wearables to smart grids and infrastructures. The threats and risks related to IoT devices, systems and services are growing, and new attacks are covered by the media every day. what are the fundamental or baseline security requirements for IoT devices that will help mitigate these risks?