Key issues involving your process improvement model

Assignment Help Computer Engineering
Reference no: EM133110597 , Length: word count:1500

MIS607 Cybersecurity - Laureate International Universities

Assessment - Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.

Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.

Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary

For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).

Context
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions

1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats

• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style.

Attachment:- Mitigation Plan for Threat Report.rar

Reference no: EM133110597

Questions Cloud

What is dyer current stock price : Dyer Furniture is expected to pay a dividend of D 1 = $1.25 per share at the end of the year, and that dividend is expected to grow at a constant rate of 6.00%
Prepare the journal entries to record the depot costs : Prepare the journal entries to record the depot and decommissioning costs for the depot on January 1, 2020. Use interest rate of interest rate of 6%
Explain the firm cost of equity : The earnings, dividends, and stock price of Shelby Inc. are expected to grow at 7% per year in the future. Shelby's common stock sells for $30 per share, its la
Maximize potential gains from an acquisition : Among the sources of financing, cash is the lowest source of financing as it is coming from retained earnings.
Key issues involving your process improvement model : Analyse the case in terms of identified risk categories and scenarios and Apply standard mitigations Discuss specific resolutions for improvement
Calculate the amount of the firm gross profit : Evening Story Corporation has sales of $4,383,257; income tax of $557,691; the selling, general and administrative expenses of $296,793; depreciation of $363,13
Illustrate the change in firm value : -M&M Theorem argue that in a world with no taxes, capital structure does not matter. Why is this the case? How will their argument change in the real world? Dis
Calculate the operating breakeven : Calculate the Operating Breakeven based on BDT sales in total units. Also calculate degree of operating leverage by considering the total 200 million sales unit
Generation skipping transfer tax : 1. Fred and Adele have a sizable estate ($4.5 million). They desire a stream of income to supplement their retirement income while also qualifying them for a ch

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compare statistical feature of r to its programming features

Compare the statistical feature of R to its programming features. In a table format, describe the programming features available in R, explain how they are.

  Write a select statement that returns four columns

Write a select statement that returns four columns based on the InvoiceTotal column of the invoices table, AP database.

  Write a java console application that manages city names

Write a Java console application that manages city names. Use an array of size 30 to store the names.

  List the critical elements of information technology needed

Develop a 6- to 8-slide, multimedia-rich presentation for your next client meeting with the management team. In your presentation: List the critical elements.

  Create and set a new maya project named box-project

Create and set a new Maya project named "Box_Project". add the name to an array of names; e.g., if the array is $boxes, then $boxes[i] = $name, where i is 0 for the first box, 1 for the second box, etc.

  Demonstrate how the pseudocode you wrote

Rewrite the above pseudocode so that it takes into account that T is actually an array.

  What critical business functions does it support

Think about your company's network infrastructure. What critical business functions does it support?

  How many independent memory channels should be provided

how many independent memory channels should be provided so the system is not limited by memory bandwidth if the bandwidth required is sometimes twice the average?

  Define array data type student-scores of length max-length

Define an array data type Student_Scores of length Max_Length. The components are of type Score_Range.

  Create an application with four classes

Create an application with four classes. Three of the classes should contain data and behavior characteristics for circle, rectangle, and cylinder.

  Provide closures to allow functions to be passed

Provide closures to allow functions to be passed around like variables. Allow easy access to array slices and those which do not.

  Develop advocacy communication skill using given information

These papers are designed to develop the participant's critical thinking through analysis and evaluation and to develop advocacy communication skills.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd