Skip to main content

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data.

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data. Cyber crimes affect individuals and companies alike. However, companies typically have more financial and other assets that can be compromised by various cyber crimes. Establishing an organization-wide information security program is a great start to mitigating cyber-related crimes and attacks. This process typically commences with an honest evaluation of the organization’s vulnerabilities and potential threats. For this assignment, you will read a brief scenario and develop a 6- to 8-page report answering the required questions.
Scenario
A contractor for the US military builds proprietary communication devices and peripherals, which allow soldiers in combat to communicate with command officers and personnel. These devices are used to transmit sensitive information regarding military deployments and battle plans. Once delivered, the devices will make contact with the US military global communications network. In order to comply with the military’s security requirements, the contractor must conduct a security risk analysis of its internal networks and information systems for intrusion detection and cyber-crime prevention. Note that the contractor is performing a security risk assessment of its own network and system and not of the military network. After all, a breach of security of the contractor’s computer systems could compromise confidential and sensitive military information. You have been asked to head up the project team that will ultimately perform this security assessment and analysis.
Tasks:
Create a 6- to 8-page report on the following aspects:
    • Distinguish what techniques should be used to start the investigation. For example, identify who should be interviewed first, determine what type of log files to review, and/or identify methods that should be used to preserve the integrity of the evidence.
    • Identify at least ten potential threats, at least ten vulnerabilities, and at least ten risks (a minimum of thirty). For each item, provide rationale to your selections and any assumptions you made.
    • Choose which type of risk-analysis methodology should be used (quantitative, qualitative, or any other methodology). Justify your decision.
    • Out of all the potential risks that you previously identified, select the top three that are of most concern to the organization. Justify your reasoning.
    • Outline and explain at least two (in total) applicable federal, state, or other related legislations that could help reduce potential risks and prevent cyber-crime activities.
Note: You may consider referring to these two websites for guidance on federal legislation and standards:
    • .nist.gov/publications/PubsFIPS.html”>http://csrc.nist.gov/publications/PubsFIPS.html
    • .nist.gov/publications/PubsSPs.html”>http://csrc.nist.gov/publications/PubsSPs.html
Your final product will be in a Microsoft Word document approximately 6–8 pages in length and utilize at least three scholarly or professional sources (beyond your textbook) in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom