Evaluate the required roles and functions of it

Assignment Help Management Information Sys
Reference no: EM131813359

Download and read the following articles available in the ACM Digital Library:

Bernier, M., Chapman, I., Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation.

Proceedings from MMS '11: Military Modeling & Simulation Symposium. Boston, MA.

Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31.

Write a four to five (4-5) page paper in which you:

Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.

Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three (3) examples.

Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise.

Then, evaluate the required roles and functions of Information Technology (IT) personnel that would be required to sustain these best practices.

Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition.

Suggest how public-private partnerships can strengthen cybersecurity efforts and effectiveness in a:

a. Corporate environment

b. Regional level

c. National level

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.

Describe the corollary roles of security in an enterprise.

Describe best practices in cybersecurity.

Use technology and information resources to research issues in cybersecurity.

Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

Reference no: EM131813359

Questions Cloud

What collaborative methods of problem : What collaborative methods of problem MEE 5901, Advanced Solid Waste Management 3 solving could be use to solve the marketing team's problem of choosing an RPF?
Write a report to update her about the potential liability : write a report to update her about the potential liability that auditors face as a result of the global financial crisis
Determine documents will contain with some sort of error : An outside financial auditor has observed that about 4% of all documents he examines contain an error of some sort. Assuming this proportion to be accurate.
Calculate the net cash flow from investing activities : The following information was taken from ABC Company's 2018 income statement: Calculate the net cash flow from investing activities for 2018
Evaluate the required roles and functions of it : Evaluate the required roles and functions of Information Technology (IT) personnel that would be required to sustain these best practices.
Review problem related to the home telephone : Suppose 7% of all households have no home telephone but depend completely on cell phones. Find the probability that in a random sample of 450 households.
Explain how the grapevine functions and why it exists : Explain how the grapevine functions and why it exists in organizational communication. Need ppt of 4-5 slides
Explain the accounting equation : Explain the accounting equation, current vs long term, accrual vs cash accounting
Average of all packages being the stated weight or greater : Some countries allow individual packages of prepackaged goods to weigh less than what is stated on the package, subject to certain conditions.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the e-commerce implementation plan

Update previously completed sections based on your instructor's feedback.

  Explain the specific information that you would communicate

CIS107-Describe one strategy that you would use to ease the identified concerns of the group, and explain the specific information that you would communicate to them to achieve this goal.

  Create an argument that e-health has significant economic

Compare the key similarities and differences between the concepts of telemedicine, tele-care, and tele-health. Provide an example of how each method is affecting the quality of today's health care services on a global scale.Create an argument that..

  Explain the role of the vendor

SDLC Methodology and Purchasing Life Cycle - Explain the role of the vendor for each of the three phases of the purchasing life cycle.

  Research three journal articles in the csu database

Journal Entry. The Journal function in Interact2 must be used. External journal sites are not permitted. If your country geo- blocks the Interact2 website or your circumstance prevents you from accessing the Internet (eg. due to a disability or if..

  Discuss the safeassign originality-checking tool

As part of the Week 4 Discussion Board assignment, you will submit a MS Word document (.doc or.docx) containing the exact contents of each discussion board.

  Discuss about the balancing function and fashion

. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application. Choose three topics covered in Chapter 11 (error messages, non-anthropomorphic design, display design, window design, and color) that..

  Define a test plan or script

Testing process summary: Define a test plan or script that identifies major software functionality and hardware to be tested with the required outcomes

  Prepare a simple javascript program

JavaScript Program - Prepare a simple JavaScript program that reads two numbers from the user and then displays the product.

  Write a memo about the logic design process

Write a two page memo to document your logical design including the process you went through.

  Why the failure rate of it initiatives is surprisingly high

Next, speculate on one additional reason (not discussed in the text) why the failure rate of IT initiatives is surprisingly high. Justify your response.

  Compare and contrast three types of task interdependence

compare and contrast three types of task interdependence use of technology1. compare and contrast three types of task

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd