Design and develop a technology-supported security solution

Assignment Help Computer Network Security
Reference no: EM132998800

A. Write an executive report that includes the following requirements:

The security problem under investigation
Root cause analysis of the problem
Description of the stakeholders
An analysis of systems, processes, or both
A description of the project requirements
The data available or the data that needs to be collected to support the project
the industry-standard methodology you used to guide and support the solution's design and development
deliverables associated with the design and development of the technology solution
The strategy for implementing the solution and anticipated outcomes from the project, including phases of the rollout, details of project launch, and training plan for users
assessment of risks associated with the implementation
the technology environments, tools, and any related costs, as well as the human resources, that are necessary to execute each project phase
a projected timeline, including milestones, start and end dates, duration for each milestone, dependencies, and resources assigned to each task
the framework that will be used to assess the success of the project and assess if the security solution meets stakeholder's needs, including test cases and acceptance criteria

Design and develop a technology-supported security solution that addresses your identified business problem or organizational need.
1. Your solution must contribute to at least one of the following major security areas:
Cyberlaw, Regulations, and Compliance
Leadership and Professionalism
Security Planning and Management
Systems Security

2. Provide a summary that explains how your solution meets the following criteria:
• facilitates the development of consensus-based codes of conduct
• promotes the adoption of standards and practices
• promotes automation in cybersecurity
• improves and modernizes security assurance
• implements industry-standard security tools and infrastructure or environment
• collects digital evidence, including data for analysis or forensics
• provides cybersecurity plans, strategies, and policies
• implements confidentiality, integrity, and availability
• mitigates cybersecurity threats
• investigates cybersecurity incidents or crimes
• includes decision-support functionality
• provides a training plan for users
C. Create each of the following forms of documentation for the solution you have developed:
• a subset of comprehensive elements of cybersecurity plans, policies, standards, or procedures
• analysis of the alignment of the solution with organizational cybersecurity initiative or regulatory compliance
• assessment of the solution's implementation, including testing results and implemented revisions
• applications, tools, installation, and user guides for any other environment used
• assessment of the efficiency of the solution
• post-implementation systems and process analysis, including diagrams or descriptions of the environment
• post-implementation risk assessment
• analysis of collected data
• analysis of the final output
• stakeholder impact analysis
• post-implementation and maintenance plans for the solution, including supporting resources
• the results from the solution testing and revisions
• training plan for users
• control deficiencies analysis that includes a plan of action and milestones
• source code and executable files, with installation and user guides, if applicable
• artifacts from the domain your solution addresses (listed below)
Domain: Cyber Risk Management and Oversight
- organization chart
- cybersecurity-related policies and procedures
- strategic plans
- cybersecurity job descriptions
- cybersecurity personnel qualifications
- risk assessments
- data loss prevention analysis
- IT audit schedule
- IT audit reports and correspondence
- audit exception tracking
- risk management reports
- cybersecurity training policies and procedures
- cybersecurity training and awareness materials
Domain: Cybersecurity Controls
- list of physical access controls (e.g., key cards, biometric controls, video cameras)
- baseline security configuration standards
- vulnerability or patch management policies and procedures
- patch management reports
- penetration test results and reports
- vulnerability assessments
- continuous monitoring strategy
Domain: External Dependency Management
- list of third parties and subcontractors
- contracts governing all third-party relationships
- inventory of all third-party connections
- network topology/diagram
- independent reports on the service provider's security controls
- remote access logs
- third-party employee access reviews
- vendor management policies and procedures
Domain: Threat Intelligence and Collaboration
- list of threat intelligence resources (e.g., industry groups, consortiums, threat and vulnerability reporting services)
- management reports on cyber intelligence
Domain: Cyber Resilience
- cybersecurity event log and reports on cyber incidents
- business impact analysis
- business or corporate continuity plan
- results of resilience testing
- resilience testing reports
- cyber incident response plans
- crisis management plans
- data loss prevention analysis
- continuous monitoring strategy

Reference no: EM132998800

Questions Cloud

What is the frequency of the event : Explore a group/population which you have the MOST preconceived ideas, and a primary purpose is to experience noticeably being in the minority
Find nominal annual rate compounding quarterly : Zax decides to go through with setting up this repair and support service. However, it turns out that some of his estimates above were not accurate:
Computing the cost of equity : A firm has a debt-equity ratio of 0.64, a cost of equity of 13.04 percent, and a cost of debt of 8 percent. The corporate tax rate is 30 percent.
Which method of calculating cash flows of a company involves : Which method of calculating cash flows of a company involves making adjustments to the company's net income? Which is true of publicly-traded corporations?
Design and develop a technology-supported security solution : Root cause analysis of the problem - Design and develop a technology-supported security solution that addresses your identified business problem or organization
What category on the income statement should be recorded : What category on the income statement should the $100,000 be recorded? Assume your company has purchased part ownership (shares) in one of supplier companies.
Calculate the earnings before tax of a company : Calculate the earnings before tax (EBT) of a company which has $2 million in sales; cost of goods sold of $1 million; selling expenses of $200,000
Calculate the company net income or eat : Calculate the company's net income (EAT) (use only what data you need): Sales = 2,000. Income tax rate = 50%. COGS = 10% of sales.
Calculate the ebit of a company : Calculate the EBIT of a company which has $1 million in sales; $450,000 in cost of goods sold; selling expenses of $75,000; general and administrative expenses

Reviews

Write a Review

Computer Network Security Questions & Answers

  Determine largest allowable sender window

Assume the sqquence number space is of size k. Determine the largest allowable sender window which will avoid the happening of problems of these protocols?

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Implement a synchronization mechanism

Develop an event based onetime password (OTP) system-Perform Collision Resistance analysis on the OTP generation algorithm.

  Analyze the significant changes

802.11 standards continue to advance at a fairly rapid pace. Analyze the significant changes that have taken place over the past decade from a business.

  Do you agree that billie should try to better coordinate

Billie Morris is the BI Director at Love You, a large manufacturer and distributor of upscale cosmetics products for women.

  Research denial-of-service attacks

Compose a 1-2 page paper giving an explanation on each type of network attack and what network administrators can do to prevent these types of attacks.

  Explain the use of file transfer protocol

Explain the use of File Transfer Protocol

  What is an information security program?

What is an information security program?

  Prepare analysis of the interconnectedness of cybersecurity

Prepare a paper highlighting the threat that China poses to the United States as regards Cyberwar and theft of Intellectual Property (IP). The student should identify the key issues and recommend an effective strategy for US policy makers.

  What are some benefit of a feistel structure

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Describe the types of sensors that can be used in a nids

What advantages do a Distributed HIDS provide over a single system HIDS? Describe the types of sensors that can be used in a NIDS.

  Extract file using steganography tools

There is a hidden file with in these 2 pictures. hidden file is an excel file. It was hidden using steganography tools. Can you help me extract that file

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd