Design and develop a technology-supported security solution

Assignment Help Computer Network Security
Reference no: EM132998800

A. Write an executive report that includes the following requirements:

The security problem under investigation
Root cause analysis of the problem
Description of the stakeholders
An analysis of systems, processes, or both
A description of the project requirements
The data available or the data that needs to be collected to support the project
the industry-standard methodology you used to guide and support the solution's design and development
deliverables associated with the design and development of the technology solution
The strategy for implementing the solution and anticipated outcomes from the project, including phases of the rollout, details of project launch, and training plan for users
assessment of risks associated with the implementation
the technology environments, tools, and any related costs, as well as the human resources, that are necessary to execute each project phase
a projected timeline, including milestones, start and end dates, duration for each milestone, dependencies, and resources assigned to each task
the framework that will be used to assess the success of the project and assess if the security solution meets stakeholder's needs, including test cases and acceptance criteria

Design and develop a technology-supported security solution that addresses your identified business problem or organizational need.
1. Your solution must contribute to at least one of the following major security areas:
Cyberlaw, Regulations, and Compliance
Leadership and Professionalism
Security Planning and Management
Systems Security

2. Provide a summary that explains how your solution meets the following criteria:
• facilitates the development of consensus-based codes of conduct
• promotes the adoption of standards and practices
• promotes automation in cybersecurity
• improves and modernizes security assurance
• implements industry-standard security tools and infrastructure or environment
• collects digital evidence, including data for analysis or forensics
• provides cybersecurity plans, strategies, and policies
• implements confidentiality, integrity, and availability
• mitigates cybersecurity threats
• investigates cybersecurity incidents or crimes
• includes decision-support functionality
• provides a training plan for users
C. Create each of the following forms of documentation for the solution you have developed:
• a subset of comprehensive elements of cybersecurity plans, policies, standards, or procedures
• analysis of the alignment of the solution with organizational cybersecurity initiative or regulatory compliance
• assessment of the solution's implementation, including testing results and implemented revisions
• applications, tools, installation, and user guides for any other environment used
• assessment of the efficiency of the solution
• post-implementation systems and process analysis, including diagrams or descriptions of the environment
• post-implementation risk assessment
• analysis of collected data
• analysis of the final output
• stakeholder impact analysis
• post-implementation and maintenance plans for the solution, including supporting resources
• the results from the solution testing and revisions
• training plan for users
• control deficiencies analysis that includes a plan of action and milestones
• source code and executable files, with installation and user guides, if applicable
• artifacts from the domain your solution addresses (listed below)
Domain: Cyber Risk Management and Oversight
- organization chart
- cybersecurity-related policies and procedures
- strategic plans
- cybersecurity job descriptions
- cybersecurity personnel qualifications
- risk assessments
- data loss prevention analysis
- IT audit schedule
- IT audit reports and correspondence
- audit exception tracking
- risk management reports
- cybersecurity training policies and procedures
- cybersecurity training and awareness materials
Domain: Cybersecurity Controls
- list of physical access controls (e.g., key cards, biometric controls, video cameras)
- baseline security configuration standards
- vulnerability or patch management policies and procedures
- patch management reports
- penetration test results and reports
- vulnerability assessments
- continuous monitoring strategy
Domain: External Dependency Management
- list of third parties and subcontractors
- contracts governing all third-party relationships
- inventory of all third-party connections
- network topology/diagram
- independent reports on the service provider's security controls
- remote access logs
- third-party employee access reviews
- vendor management policies and procedures
Domain: Threat Intelligence and Collaboration
- list of threat intelligence resources (e.g., industry groups, consortiums, threat and vulnerability reporting services)
- management reports on cyber intelligence
Domain: Cyber Resilience
- cybersecurity event log and reports on cyber incidents
- business impact analysis
- business or corporate continuity plan
- results of resilience testing
- resilience testing reports
- cyber incident response plans
- crisis management plans
- data loss prevention analysis
- continuous monitoring strategy

Reference no: EM132998800

Questions Cloud

What is the frequency of the event : Explore a group/population which you have the MOST preconceived ideas, and a primary purpose is to experience noticeably being in the minority
Find nominal annual rate compounding quarterly : Zax decides to go through with setting up this repair and support service. However, it turns out that some of his estimates above were not accurate:
Computing the cost of equity : A firm has a debt-equity ratio of 0.64, a cost of equity of 13.04 percent, and a cost of debt of 8 percent. The corporate tax rate is 30 percent.
Which method of calculating cash flows of a company involves : Which method of calculating cash flows of a company involves making adjustments to the company's net income? Which is true of publicly-traded corporations?
Design and develop a technology-supported security solution : Root cause analysis of the problem - Design and develop a technology-supported security solution that addresses your identified business problem or organization
What category on the income statement should be recorded : What category on the income statement should the $100,000 be recorded? Assume your company has purchased part ownership (shares) in one of supplier companies.
Calculate the earnings before tax of a company : Calculate the earnings before tax (EBT) of a company which has $2 million in sales; cost of goods sold of $1 million; selling expenses of $200,000
Calculate the company net income or eat : Calculate the company's net income (EAT) (use only what data you need): Sales = 2,000. Income tax rate = 50%. COGS = 10% of sales.
Calculate the ebit of a company : Calculate the EBIT of a company which has $1 million in sales; $450,000 in cost of goods sold; selling expenses of $75,000; general and administrative expenses

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd