Analyze the strategy used to protect the large organization

Assignment Help Computer Engineering
Reference no: EM132232422

Question: Capstone Project Overview

The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments.

Project Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Research the Internet for a large organization, reviewing its cybersecurity policy.

From the textbook, examine the phrase "policy as a project" from the Cyber Security Policy Guidebook, taking into account the security cycle. (please see textbook pages below)

Submission Requirements: • Document (MS Word)

• Microsoft Project (MS Project)

Section 1: Write a three to four (3-4) page paper in which you:

1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.

2. Describe how your researched large organization uses "policy as a project" in its program.

3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.

4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.

Section 2: Using Microsoft Project, or an open source alternative such as OpenProj, to:

5. Record all tasks, subtasks, resources, and time related to the security cycle.

6. Outline the organization's business, the systems, mission, and / or risk management phases in your design.

7. Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

The specific course learning outcomes associated with this assignment are:

• Discuss cybersecurity strategies and the various frameworks.

• Discuss the threats of modern technology in the workplace.

• Discuss how policies play an important role in techniques adopted for cybersecurity.

• Use technology and information resources to research issues in information assurance.

• Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Reference no: EM132232422

Questions Cloud

Marginal rate of substitution of l for c : Assume Mindy gains utility from consumption C and leisure L. The total non-labor income she gets is $550 per week and the total non-sleeping time
How will international transportation companies benefit : How will international transportation companies benefit from these expansions? Give three benefits.
What is meant by the term informal economy : What relation does it have to the "formal" economy, and what challenges has it presented for how we think about the economy?
Individual personality and history : How does the appropriation of mass produced commercial items within the domestic space express not just markers of status but also individual personality
Analyze the strategy used to protect the large organization : The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques.
Firm increase or decrease the amount of capital used : If not, should the firm increase or decrease the amount of capital used in its production process?
Events occurring in environment that influence organizations : Describe in detail the dimensions of the patterns and events occurring in the environment that influence organizations.
How does democracy help the citizen in this circumstance : In denying a citizen or violating his or her property rights, how does this affect the economic development and how does democracy help the citizen
Consumer price index to overstate inflation : Why does the substitution bias cause the consumer price index to overstate inflation and the cost of living?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the various aspects of organizational performance

The process of planning business operations starts with defining, measuring, and determining the policies of management that will shape the firm's operational.

  How is information technology different from information

how is information technology different from information systems?your response should be at least 200 words in length.

  Describe an in-place version of the quick-select algorithm

Describe an in-place version of the quick-select algorithm in pseudo-code. Show that the worst-case running time of quick-select on an nelement sequence is (n2)

  Write a subroutine to subtract two numbers in asc

What restrictions are to be imposed on the assembly language if a single-pass assembler is needed?

  Why td updates are likely to be much better

Can you see why TD updates are likely to be much better, at least initially, in this case? Might the same sort of thing happen in the original task?

  Write a program that will accept two days of the same year

Write a program that will accept two days of the same year (in month-day form) and output the elapsed time between the two days.

  Considering the network environment services and solutions

you were hired as the manager for network services at a medium-sized firm. this firm has 3 offices in 3 american

  Perform the action of playing word search

How would I go about writing a MATLAB program that performed the action of playing wordsearch through a character array of letters.

  Define the business venture of gaining better traction

Determine at least 5 information technology personnel / roles that would be in place in order to start the business venture of gaining better traction

  Briefly explain the given terms

Briefly explain the following terms: aperture time. conversion time. aliasing. Nyquist frequency.

  Compute how much federal and state tax you need to pay

Write down a Java application to calculate how much federal and state tax you require to pay. The program should accomplish the following task: ask your name, yearly income, federal tax rate, and state tax rate, and compute the tax you need to pay.

  Explain working procedure for karnaugh map

describe working procedure for Karnaugh map or K-map for two-, three- and four-variable functions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd