Skip to main content

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data.

Organizations of all sizes should be concerned with the security and confidentiality of their electronic data. Cyber crimes affect individuals and companies alike. However, companies typically have more financial and other assets that can be compromised by various cyber crimes. Establishing an organization-wide information security program is a great start to mitigating cyber-related crimes and attacks. This process typically commences with an honest evaluation of the organization’s vulnerabilities and potential threats. For this assignment, you will read a brief scenario and develop a 6- to 8-page report answering the required questions.
Scenario
A contractor for the US military builds proprietary communication devices and peripherals, which allow soldiers in combat to communicate with command officers and personnel. These devices are used to transmit sensitive information regarding military deployments and battle plans. Once delivered, the devices will make contact with the US military global communications network. In order to comply with the military’s security requirements, the contractor must conduct a security risk analysis of its internal networks and information systems for intrusion detection and cyber-crime prevention. Note that the contractor is performing a security risk assessment of its own network and system and not of the military network. After all, a breach of security of the contractor’s computer systems could compromise confidential and sensitive military information. You have been asked to head up the project team that will ultimately perform this security assessment and analysis.
Tasks:
Create a 6- to 8-page report on the following aspects:
    • Distinguish what techniques should be used to start the investigation. For example, identify who should be interviewed first, determine what type of log files to review, and/or identify methods that should be used to preserve the integrity of the evidence.
    • Identify at least ten potential threats, at least ten vulnerabilities, and at least ten risks (a minimum of thirty). For each item, provide rationale to your selections and any assumptions you made.
    • Choose which type of risk-analysis methodology should be used (quantitative, qualitative, or any other methodology). Justify your decision.
    • Out of all the potential risks that you previously identified, select the top three that are of most concern to the organization. Justify your reasoning.
    • Outline and explain at least two (in total) applicable federal, state, or other related legislations that could help reduce potential risks and prevent cyber-crime activities.
Note: You may consider referring to these two websites for guidance on federal legislation and standards:
    • .nist.gov/publications/PubsFIPS.html”>http://csrc.nist.gov/publications/PubsFIPS.html
    • .nist.gov/publications/PubsSPs.html”>http://csrc.nist.gov/publications/PubsSPs.html
Your final product will be in a Microsoft Word document approximately 6–8 pages in length and utilize at least three scholarly or professional sources (beyond your textbook) in your research. Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM