Implement security-cybersecurity status

Assignment Help Basic Computer Science
Reference no: EM132509465

Implement a security framework to identify and close gaps between an organization's current cybersecurity status and its target (future) cybersecurity status. Make sure to align with an appropriate regulation (PCI DSS).

Develop a report that addresses the following:

Organizational Objectives and Priorities

1. Current Framework Compliance Status: Describe the current cybersecurity environment, such as processes, information, and systems directly involved in the delivery of services. Describe the current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints using the framework identified. Include a diagram related to the common workflow of information and decisions at the major levels within the organization.

2. Future Cybersecurity Policy Implementations: Describe the critical cybersecurity needs that should be in place to ensure compliance with the appropriate regulation (PCI DSS) and then prioritize organizational efforts, business needs, and outcomes.

Operational Compliance and Risk Assessment

Cybersecurity Risk Assessment: Describe the likelihood of risks occurring and the resulting impact. Identify threats to, and vulnerabilities of, those systems and assets. Express risks both internally and externally. Determine the acceptable level of risk (risk tolerance). Describe the response to the risk. Describe how identified risks are managed and resolved. Include an Organizational Risk Assessment Chart.

Privacy Risk Management: Describe how the business is integrating privacy laws and regulations, prioritizing, and measuring progress.

Compliance Gaps: Describe the type of audits that should be performed in order to keep a consistent measure of risk. Determine what type of gap analysis should be performed in order to properly identify the security elements and variables within the environment that pose the most risk. Formulate a cybersecurity governance strategy that establishes mitigation plans to achieve security objectives.

Web Portal Diagram: Create a web portal data flow diagram of the hypothetical organization's operational environment using Visio or similar diagramming software. Within the web portal data flow diagram, students will show how the web portal is compliant. The web portal data flow diagram must: a) Display the organization's technical requirements (related and unrelated applications, services, and links); b) display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, e-mail servers, and so forth; c) identify related systems and assets, regulatory requirements, and overall risk approach; and d) demonstrate each IT task to the next as aligned to regulations/compliance (e.g., start with the user logging in, and then go through each step and how it is validated.

Reference no: EM132509465

Questions Cloud

What state will have to do in order to achieve deterrence : The concept of deterrence plays an important role in our system. Laws are in place to punish offenders but also to hopefully dissuade potential offenders from.
Discuss particular type of malware : Discuss a particular type of Malware and how has it been used in "today's news" and the respective impact on cybersecurity.
Discuss the effects on law enforcement organizations : Examine the change in requirements that police hiring agencies have had for potential candidates over the last 50 years and discuss the effects on law.
How much does he owe on the mortgage : After making 140.00 payments, how much does he owe on the mortgage?
Implement security-cybersecurity status : Implement a security framework to identify and close gaps between an organization's current cybersecurity status and its target (future) cybersecurity status.
What should tuition per student be : What should tuition per student be?What was the amount of operating income the flexible budget would have shown for the actual activity level for June?
Compare the two opmanager network management tools : Discuss in detail similarities and differences between the two OpManager tools with necessary diagrams and charts
How citizens will report information to the police : You are a lieutenant in a medium-sized, suburban police department. You have been approached by a group of citizens from a neighborhood that has experienced.
What should tuition per student be : What should tuition per student be?What was the amount of operating income the flexible budget would have shown for the actual activity level for June?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Evaluate in qualitative v quantitative risk assessment

Discuss in the differences between and advantages of MAC, DAC, and RBAC. Compare and evaluate in qualitative v quantitative risk assessment.

  Give an example where the error bound is attained

How does the smoothness of a function and its derivatives affect the quality of polynomial interpolants that approximate it, in general?

  Contribution to computer science

Write a 250-300 word description for each person stating who they are, what their contribution to Computer Science was, and why it was significant. Include at least 3 references for each person. Please use proper grammar and important content. (W..

  Calculate the tax rate for person

Assume that under the current tax system the rich pays $60,000 and the poor pays $1,200.

  Progressive tax system

Which type of a tax system would you prefer - a progressive tax system or a flat tax system? Provide several reasons why you would prefer this type.

  Hypothetical situation in which legitimate organization

describe a hypothetical situation in which a legitimate organization used spam in effective and nonintrusive manner to promote a product or service.

  Report on security awareness policy

You will write a research report on Security Awareness Policy (SAP),. The organization needs to be compliant with the Gramm-Leach-BlileyAct.

  Write dimensions of memory containing bytes of storage

Write down the dimensions of a memory containing 1mb(2^20) bytes of storage? How large would the MAR be? how many bits are sent to the row column decoders?

  Draw a schematic for a t flip-flop using a d flip-flop

The toggle (T) flip-flop has one input, CLK, and one output, Q. On each rising edge of CLK, Q toggles to the complement of its previous value. Draw a schematic for a T flip-flop using a D flip-flop and an inverter.

  What are types of attacks that different mac functions

What are types of attacks that different MAC functions are vulnerable to. How do we protect against them?

  Compute the support for each item and each pair of items

Suppose the support threshold is 4. On the first pass of the PCY Algorithm we use a hash table with 11 buckets, and the set {i, j} is hashed to bucket i × j mod 11.

  State iris''s cost minimization problem

a) State Iris's cost minimization problem and use it to derive the optimal quantities of N and A given the number of tulips produced. b) Derive Iris's total cost function. c) Derive the marginal cost function of producing tulip bulbs. d) Should Iris ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd