PAD 3034 UCF Organizational Structures Essay

User Generated

Zfneonxu

Law

PAD 3034

University of Central Florida

PAD

Description

For this week’s Reasoning and Reflection post, please read the two Washington Post articles provided in the links below. The articles examine the topic of ransomware, which many local governments around the country have faced in recent years. After reviewing these sources, as well as this week’s materials, please respond to the two discussion prompts below. Your answers should be approximately 500 words in length for each question, and should connect the material covered in this week’s reading to the ransomware readings, while also reflecting on your own sense of public service ethics and how they apply to this circumstance.

Washington Post News Article

https://www.washingtonpost.com/business/2019/06/20/florida-city-will-pay-hackers-get-its-computer-systems-back/?utm_term=.30b176c9a6b3Links to an external site.

Washington Post Editorial

https://www.washingtonpost.com/opinions/hackers-are-taking-cities-hostage-heres-a-way-around-it/2019/06/23/f08b79ea-9459-11e9-aadb-74e6b2b46f6a_story.html?utm_term=.67253c697045Links to an external site.

Discussion Prompts

  1. Imagine yourself for a moment as a new city or county administrator. What steps would you recommend taking in order to prepare for a threat such as the one faced by the City of Riviera Beach in the news article above?
  1. Do you agree with the argument made in the Washington Post editorial? Do you believe that the State of Florida, or perhaps even the United State Federal Government, should consider passing an anti-ransomware law? Or should it be up to local municipalities whether or not they want to pay the ransom in these situations? Please briefly explain the reasoning for your answer!

Student Learning Outcomes and Grading Rubric for this Assignment

This exercise emphasizes the following learning outcomes associated with this course.

  • Understand the role of public, private, nonprofit, and non-governmental organizations in formulating and implementing public policy. (LO1)
  • Identify and explain how governance, multi-sectoral, and organizational structures can be leveraged to achieve public and community interests. (LO2)
  • Understand and evaluate how external factors influence public institutions, processes, and organizations. (LO3)
  • Understand and apply principles and skills of public/nonprofit management – to include the ethics and ethos of public and community service… to address societal problems. (LO4)
  • Evaluate the impact of individual choices on local and global communities. (LO5)
  • Communicate ideas and information to diverse audiences. (LO7)
  • Demonstrate an ability to recognize ethical and professional responsibilities. (LO9)

Explanation & Answer:
500 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

Public Service Writing Question

Student’s Name
Institutional Affiliation
Course
Name of Instructor
Date

2

Public Service Writing Question
As a new city or county administrator, I advise taking the precautions below to
prepare for a threat like the one the City of Riviera Beach encountered in the news article.
These steps would enhance the city's cybersecurity measures and mitigate the impact of
ransomware attacks.
First and foremost, it is crucial to prioritize cybersecurity within the organization.
This involves creating a dedicated cybersecurity team or hiring cybersecurity professionals to
assess the existing infrastructure, identify vulnerabilities, and develop a comprehensive
security strategy (Washington Post, 2019). This team should monitor and respond to potential
threats, implement security protocols, and conduct regular audits to ensure compliance with
best practices.
Regular personnel training and awareness initiatives are crucial for the city to be
better protected against ransomware attacks. Employees must get training on spotting and
reporting unusual activity and typical attack vectors like phishing emails. The city can lower
the possibility of a worker unintentionally starting an attack by promoting a culture of
cybersecurity knowledge.
Implementing strong access controls and data encryption measures is another crucial
step. This involves limiting access to sensitive data and systems only to authorized personnel,
utilizing multi-factor authentication, and encrypting data both in transit and at rest
(Washington Post, 2019). By doing so, the city can reduce the likelihood of unauthorized
access and mitigate the potential impact of a successful attack.
Regular data backups are paramount to recovering from a ransomware attack. The
city should establish a robust backup system with frequent critical data and system backups.
In order to prevent them from being compromised during an attack, these backups should be

3

kept offline or in a different, safe place. It is crucial to regularly test the restoration procedure
to confirm the backups' accuracy and dependability.
In addition to preventive measures, an incident response plan is crucial. This plan
should outline the steps during a ransomware attack, including the immediate isolation of
affected systems, reporting the incident to law enforcement and relevant authorities, and
engaging external cybersecurity experts for assistance. By having a well-defined response
plan, the city can minimize response time and coordinate efforts effectively to mitigate the
attack's impact.
Collaboration with other government agencies and sharing information on emerging
threats are vital. Participating in regional or national cybersecurity networks can provide
access to valuable resources, threat intelligence, and best practices (Washington Post, 2019).
The city can proactively adapt its security measures to counter new attack techniques by
staying informed about the evolving threat landscape.
Finally, advocating for legislation at the federal level, as suggested in the Washington
Post editorial, can provide long-term solutio...

Similar Content

Related Tags