How the organization will address dynamic cyber risk

Assignment Help Computer Engineering
Reference no: EM133715589

Homework: Computer Science

This homework will help you to fulfill the requirements for the third course objective (Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments).

Instructions:

You are tasked as the Chief Information Security Officer for a large Fortune 500 International Firm to plan, develop and manage the functions that oversee a new large scale Cybersecurity program. The large scale Cybersecurity program will be a "Digital Blackwater" type organization (see the description below of "Private or Mercenary Armies" from the textbook).

For the purpose of this homework, you are to search the Internet and utilize course reading materials to research the types of functions, strategies and tactics this organization will use for this new program. Use your imagination and name your proposed organization and follow the requirements below:

Requirements:

I. 4 to 6 Pages in length.

II. Cover Page

III. Introduction - Firm name and overview of its purpose

IV. Technical organizational proposal:

1. Value proposition for the new organization
2. Functions of the organization including management
3. How the organization will address dynamic Cyber risk and threat environments
4. Strategies and tactics the organization will employ
5. Proposed benefits for the U.S. government
6. How will the organization make a profit

V. Reference Section

Miscellaneous:

I. Use current and real world data to make your points, not just the textbook
II. Your references should not be more than 5 years old
III. Your homework is due by Sunday not later than 11:59 p.m. Eastern time.

Private or Mercenary Armies

In an age where cyber warfare is more common than the physical battlefield, it may be necessary for the private sector to stop playing defense and go on offense, Gen. Michael Hayden said on August 1, 2011. Hayden, who led the National Security Administration and Central Intelligence Agency under president George W. Bush, said during a panel discussion at the Aspen Security Forum in Aspen, Colo. that the federal government may not be the sole defender of private sector companies-and that there is precedent for such action. "We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space," he said. "Let me really throw out a bumper sticker for you: how about a digital Blackwater?" he asked. "I mean, we have privatized certain defense activities, even in physical space, and now you have got a new domain in which we donot have any paths trampled down in the forest in terms of what it is we expect the government-or will allow the government-to do". Blackwater is a private military contractor that has changed its name to Academi after incidents in Iraq gave them a negative image. If companies decide to hire forces (hackers) to strike back or conduct recovery operations it could change the cyberspace battlefield dramatically (Winterfield and Andress, 2013).

Reference no: EM133715589

Questions Cloud

Create bcc enterprise information security budget : Create BCC Enterprise Information Security Organizational Budget in Microsoft Word or Microsoft Excel that includes identified information security initiatives.
Diagnosed with subarachnoid hemorrhage : The nurse is caring for a patient who is newly diagnosed with subarachnoid hemorrhage and is reporting a headache and nausea.
Create a ppt on the financial decision comparing your bcc : Create a PPT on the financial decision comparing your BCC Enterprise Capital Investment recommendation with the IPS Budget Plan completed.
What information is out there can we assign the source : ISSC 480- Obviously our first step is to start researching the attacks. What information is out there, can we assign the source of the attacks with certainty?
How the organization will address dynamic cyber risk : How the organization will address dynamic Cyber risk and threat environments? How will the organization make a profit?
Compare and contrast project management methodologies : PROJ6000 Principles of Project Management, Torrens University Australia - Compare and contrast project management methodologies and their application
Define and describe the process of rightsizing : Define and describe process of rightsizing. Define and describe green computing. Evaluate impact green computing issues are having on customer buying decisions.
What was the specific impact on the cost of both approaches : What was the specific impact on the cost of both approaches? Include specific figures to back your position and explain why you believe this cost outcome
Summary of down syndrome : Give a brief summary of Down Syndrome and typical speech characteristics in this population.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd