Discuss the current it cybersecurity policy

Assignment Help Computer Network Security
Reference no: EM13758251

The primary purpose of this project is for you to demonstrate your understanding of the principles covered in this course. You will create a minimum 12 PowerPoint slides to summarize the policy review conducted and your recommendations for the next steps the merged company should take to protect its data and information assets. The cover, summary/conclusion and reference slides are not part of the slide count. It will also include a minimum of 5 references.

Each policy review and recommendations presentation should address the following:

Current policy: Discuss the current (as per the case study) IT cybersecurity policy.

New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy. Identify cybersecurity vulnerabilities that could be introduced by the new technology that might not be mitigated by technological configuration management.

Recommendations: Discuss revisions and modifications that must be made to the current IT cybersecurity policy to ensure that the new technology does not compromise the organization's cybersecurity posture. Address the inter- and intra-organization leadership, managerial, and policy challenges and effects associated with the recommendations.

Create 10-12 Power Point Slides that summarize the security policies you are recommending be implemented based upon the case study.

Reference no: EM13758251

Questions Cloud

Provide the owner with a reasonable rate of return : A business should provide the owner with a reasonable rate of return based upon:
What is the implied service rate : What is the implied service rate at a bank teller window if customer demand is 34 customers per hour, two bank tellers are on duty, and their labor utilization is 85%?
Quality planning-quality assurance and quality control : What is Quality? Describe the elements of Quality Planning, Quality Assurance, and Quality Control. Why are these elements important to successful project completion?
Strategic leadership and entrepreneurship analysis : What is your sphere of influence in your organization? Based on this, what impact can you have on the implementation of your business plan? What is your own bias? What hurdles do you anticipate? What leadership style(s) will you have to demonstrate? ..
Discuss the current it cybersecurity policy : Current policy: Discuss the current (as per the case study) IT cybersecurity policy. New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy
Given that making revenue policy is typically responsibility : Given that making revenue policy is typically the responsibility of elected officials, what are the roles and responsibilities of managers with respect to the administration of taxes and other revenues?
Development methods and tools : Describe alternative development methods and tools that augment development methods
What characteristic of the organization : What characteristic of the organization (target) have contributed to its success or lack success in the international marketplace?
Definitely changed the marketing landscape : The immediacy of technological communications has definitely changed the marketing landscape in many ways. Another thing to consider is that the Internet certainly gives way for more third-party vendors to enter the picture. We appreciate your contri..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What if ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?

  Creating a presentation regarding system security

Your quality improvement circle has been assigned the task of creating a presentation regarding system security as it applies to the ability of the general public access to a combined personal and the electronic medical record housed by the hospit..

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Udp programs allowing two parties to establish a secure

Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob

  What is the main goal in a denial of service attack

What is the main goal in a Denial of Service (DoS) attack? What is the difference between a virus and a worm

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  It infrastructure management what to do for task 2a

what to do for task 2a 15 ltbrgt ltbrgtsubmit your enterprise architect blog as a single page with the web address of

  Research commercial data repositories be sure to understand

in this writing assignment you will create a brochure advertising your services as a data repository.research

  Decrypt the ciphertext message uw dm nk qb ek which was

decrypt the ciphertext message uw dm nk qb ek which was encrypted using the digraphic cipher that sends the plaintext

  Examine the pros and cons of hiring white-hat hackers in

ip addresses and network security testing please respond to the following1.examine five reasons why ipv6 has not

  Describe common security concerns inherent to wired

Describe common security concerns inherent to wired, wireless, and mobile networking.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd