Lightning Round: Is there a cybersecurity industry, writing homework help

timer Asked: Jun 15th, 2016
account_balance_wallet $25

Question Description

You have

1. "Lightning Round:" Is there a cybersecurity industry?

been invited to present your "case study research" (from Case Study #3: Is there a cybersecurity industry?) during a "lightening round" panel for your CTO's monthly "brown bag" luncheon. The CTO sponsors these panels to help staff members learn more about technologies. The panels also provide an opportunity to develop "public speaking" skills.

To prepare for your presentation, you must write a 3 to 5 paragraph briefing statement in which you summarize your findings. This will be reviewed by the CTO before you give your presentation. Your briefing statement must provide:

1. An introduction to the topic that answers the question "What is an 'industry?'"

2. Provide an analysis that discusses why market researchers treat cybersecurity as an "industry" but, the NAICS system does not.

3. Provide a summary & conclusions section in which you state your opinion as to whether or not cybersecurity should be assigned a unique NAICS code. Provide 3 supporting facts or reasons for your choice.

Case Study #3: Is there a cybersecurity industry?

Case Scenario:

You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price. As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS) code(s) for the “cybersecurity” industry to the company’s Website.  As you delve into the matter, you quickly discover that there is no NAICS code for a “cybersecurity” industry (see After additional research, you learned that the NAICS codes for your company’s direct competitors (companies selling similar cybersecurity products) included the following:

·  Computer and Electronic Product Manufacturing (NAICS prefix “334”)

o  Computer Terminal and Other Computer Peripheral Equipment Manufacturing

o  Computer Storage Device Manufacturing

·  Information Industry (NAICS prefix “51”)

o  Custom Computer Programming Services

o  Software Publishers

·  Professional, Scientific, and Technical Services Industry (NAICS prefix “54”)

o  Computer Systems Design Services

o  Electronic Stores

·  Retail Trade (NAICS prefix “44”)

o  Electronic Stores

You also learned that the NAICS system was designed to be production or product oriented and that provisions exist for adding new or emerging industries to the NAICS classification system (see NAICS Update Process Fact Sheet, p. 4, section “The Four Principles of NAICS”‌/eos/‌www/‌naics/‌reference_files_tools/‌NAICS_Update_Process_Fact_Sheet.pdf )

Your team leader has asked you to write a short report detailing your findings and recommending which industry your company should declare as its primary industry (out of the four listed above). Your report should include a justification for your selection. Your team leader has also asked you to provide a well-reasoned explanation as to why “cybersecurity” is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS.

NAICS codes are incorporated into many business directory listings, independent financial reports / market analyses, and credit reports. Many large organizations, especially government agencies, require that a company have both a Dun & Bradstreet Data Universal Numbering System (D-U-N-S) number and one or more NAICS codes assigned to the company prior to being listed as an approved supplier. 


1.  Read / Review the Week 5 readings. Pay close attention to those readings which provide evidence that “cybersecurity” is, in fact, an industry.

2.  Research additional information about industry classifications, why they were developed, and how they are used. Here are some suggested sources:




d. (See page 4: “The Four Principles of NAICS” Principles #1 & #2)

3.  Find three or more additional sources which provide evidence that “cybersecurity” is or is not a distinct industry.


Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your summary must include the following:

1.  Introduction which includes a well-reasoned explanation as to why “cybersecurity” is considered an industry by many reporters and market analysts but is not listed as a unique industry under NAICS. Your introduction should include an explanation of the importance of standardized industry classification codes (who uses them and why).

2.  Analysis and discussion of one or more industry codes which could be used by your cybersecurity company (based upon the product listed in this assignment). The discussion should include a comparison between your company’s business activities and the industry characteristics for the four classification families listed in this assignment (prefixes 334, 44, 51, & 54).

3.  Recommendation for the best fit for a single NAICS code to be used by your company on its website and included in its business directory listings and financial reports.

Submit For Grading & Discussion

1.  Submit your case study in MS Word format (.docx or .doc file) using the Case Study #3 Assignment in your assignment folder. (Attach the file.)

2.  Post your case study for discussion with your classmates. First, create a new topic in the Case Study #3 Discussion Forum. Then, paste the contents of your Case Study #3 document directly into that message. (Do not attach the file.)  

3.  Last posting or no posting for discussion will be penalized heavily so it is in your best interests to post your case study before the assigned due date.

Formatting Instructions

1.  Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

1.  You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.

2.  You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.

Overall Score

Tutor Answer

School: UC Berkeley

please find the attached file. let me know if you need me to make any adjustments. always a pleasure working with you

Running head: CYBER SECURITY


Cyber Security

Statement Briefing:
An industry is a combination of different forms of business organisations that produce the
same or differing products in an economy. Industries are categorized differently and normally on
the basis of the level of production they are at. These categories are three; primary, secondary
and tertiary industries. Primary industries are those industries which deal mainly with natural raw
materials, extracting them from their natural environment, offering them to the consumer as they
are or with slight modifications. Secondary industries deal with products obtained from the
primary industries as their raw materials, using machines and chemicals to alter their original
form. Consequently, the tertiary industries are those that deal specifically with offering services
to the consumers.
Cyber security on the other hand refers to the technological advancements made towards
ensuring that companies and people computers, data, programs and networks are safe from
external/internal threat through being accessed without permission, being destroyed or attacked
through viruses. It is software or systems designed and provided to secure information. Market
researchers treat this process of provision of the services towards ensuring safety in data as an
industry but the NIACS are yet to recognize and categorize them in their system.

flag Report DMCA

Thanks, good work

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors