Determine the cybersecurity maturity level of organization

Assignment Help Computer Network Security
Reference no: EM133727126

Question: Determine the cybersecurity maturity level of the organization for two assessment factors from two different domains using the statements below.

Submit a table with the domains identified that includes the following for each assessment factor:

  • Baseline
  • Evolving
  • Intermediate
  • Advanced
  • Innovative

Domain 1: Cyber Risk Management and Oversight
Assessment Factor: Risk Management
Criteria: Risk Management Program

Baseline
An information security and business continuity risk management function(s) exists within the institution.

Evolving
The risk management program incorporates cyber risk identification, measurement, mitigation, monitoring, and reporting.
Management reviews and uses the results of audits to improve existing cybersecurity policies, procedures, and controls.
Management monitors moderate and high residual risk issues from the cybersecurity risk assessment until items are addressed.

Intermediate
The cybersecurity function has no clear reporting line.
The risk management program does not address cyber risks beyond the boundaries of the technological impacts.
There are no benchmarks or target performance metrics.
Management uses the results of independent audits and reviews to improve cybersecurity.

Advanced
The cybersecurity strategy outlines the institution's future state of cybersecurity with short-term and long-term perspectives.

Innovative
The cybersecurity strategy identifies and communicates the institution's role as it relates to other critical infrastructures.

Domain 2: Threat Intelligence and Collaboration
Assessment Factor: Threat Intelligence
Criteria: Threat Intelligence and Information

Baseline
The institution belongs to a threat and vulnerability information sharing source that provides information on threats.
Threat information is used to monitor threats and vulnerabilities with some compensating controls.
Threat information is used to enhance internal risk management and controls.

Evolving
Threat information received by the institution does not include analysis of tactics, patterns, and risk mitigation recommendations.

Advanced
Cyber intelligence model is used for gathering threat information.

Innovative

A threat analysis system automatically correlates threat data to specific risks and then takes risk-based automated actions while alerting management.

Your document should be no less than 4 pages long (not including the list of references), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA format and style guidelines and submit in a single document.

Submit a 2- to 4-page paper in APA format in which you:

- Analyze the organization's risk profile in relation to its cybersecurity maturity level.

- Use the relationship matrix provided in Table 3 (p. 9) of the Federal Financial Institutions Examination Council (2017) User's Guide

- Provide comments on your findings.

Your document should be 2-4 pages long (not including the list of references), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA format and style guidelines and submit in a single document.

Reference no: EM133727126

Questions Cloud

Design of coronary artery disease : Analyze ethical issues and design in the design of coronary artery disease. Analyze issues of rigor that may arise during the proposed study.
Do you think vallow daybell killed her children : Do you think Vallow Daybell killed her children? Should be eligible for an insanity defense given her statements on zombies etc?
Describe how you would imagine a resilience strategy : The critical problems of the climate emergency and clearly describe how you would imagine a resilience strategy to combat the problem/problems.
Determine the overall financial strength of the company : BUS 401 university of arizona global campus- Determine the overall financial strength of the company based on ratios identified as either strengths or weakness.
Determine the cybersecurity maturity level of organization : Determine the cybersecurity maturity level of the organization for two assessment factors from two different domains using the statements
How did european cultures affect native american societies : To what extent did indigenous cultures and traditions. How did European cultures affect Native American societies through the process of cultural exchange?
Explain the methodology-research model of your project : What issues/problems/concerns do you see which need addressing. Explain in detail the methodology/research model of your project.
Focuses on the implementation and impact of the decision : Presentation for the administration at Central Healthcare System that focuses on the implementation and impact of the decision.
Discuss potential emergencies and complications : Discuss potential emergencies and complications in relation to grief and loss.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd