Cyber Policy Report: The culmination of your policy research, this report
should provide your CISO with an understanding of the managerial,
technical, and regulatory positions of the FVEY nations attending the summit.
The cyber policy report comprises the following materials developed by you
and your teammates throughout the project:
○ Cyber Policy Matrix: A spreadsheet or table that represents a matrix
of your FVEY country’s policies and/or laws that the government has
instituted to address cybersecurity management and technology, with
a comparison of the other nations’ policies. International laws and
regulations that deal with the acquisition, preservation, analysis, and
transfer of data will also be included.
○ Transnational Legal Compliance Report: Itemized appraisal of the
compliance requirements that are common among the FVEY nations.
○ International Standards Report: A review that determines which
international initiative is most likely to result in cooperation from all
the nations at the summit.
● Security Baseline Report: This is a comprehensive analysis of networks,
tools, threats and vulnerabilities surrounding this event. The report
comprises three reports: Attribution Report, Network Security Checklist, and
System Security Risk Vulnerability Assessment Report.
The following materials are developed by you and your teammates
throughout the project:
○ Attribution Report, in which you identify the rogue nation
responsible for the breach document, detail your processes, and
determine the impact to international relationships.
○ Network Security Checklist, an inventory of the network’s software
and hardware components used to ensure multilevel security.
○ System Security Risk Vulnerability Report, in which you identify
threats to your nation’s communication systems and the potential
impact of an exploit.