Mitigation plan for threat report based on knowledge

Assignment Help Computer Graphics
Reference no: EM132713097

MIS607 Cybersecurity - Laureate International Universities

Mitigation Plan for Threat Report

Learning Outcome 1: Explore and articulate cyber trends, threats and staying safe in cyberspace, plus protecting personal and company data.
Learning Outcome 2: Analyse issues associated with organisational data networks and security to recommend practical solutions towards their resolution.
Learning Outcome 3: Evaluate and communicate relevant technical and ethical considerations related to the design, deployment and/or the uses of secure technologies within various organisational contexts.

Task Summary
For this assessment, you are required to write a 2500 words mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment 2 case as context to write a report to address or alleviate problems faced by the business and to protect the customers. In doing so, you are required to demonstrate your ability to mitigate threat/risks identified in Assessment 2 through the strategy you recommend (STRIDE).

Context
Cybersecurity help organizations to mitigate threats/risks, reduce financial loss and safety violations, decrease unethical behaviour, improve customer satisfaction, and increase efficiency, as well as to maintain these improved results. Threats can be resolved by Risk Acceptance (doing nothing), Risk Transference (pass risk to an externality), Risk Avoidance (removing the feature/component that causes the risk) and Risk Mitigation (decrease the risk). This assessment gives you an opportunity to demonstrate your understanding of cybersecurity and your capability to explain Risk Mitigation strategies for such threats. Mitigations should be chosen according to the appropriate technology and resolution should be decided according to the risk level and cost of mitigation.

Task Instructions
1. Read the Assessment 2 Case Scenario again to understand the concepts discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Re- read any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the mitigation plan for threat report.

3. The mitigation plan for threat report should address the following:
• Setting priorities for risks/threats
• Analyse the case in terms of identified risk categories and scenarios
• Apply standard mitigations
• Discuss specific resolutions for improvement, and justify their significance
• Provide recommendations for mitigating risk based on an assessment of risk appetite, risk tolerance and current risk levels (Choose techniques to mitigate the threats)
• Make recommendations to the CEO on how to conduct risk management, key issues involving your process improvement model, including a road map, the identification of appropriate technologies for the identified techniques, communicating the strategy, and a suggested timeline.

4. The report should consist of the following structure:
A title page with subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in mitigation plan report. You will need to inform the reader of:
a) Your area of research and its context (how to mitigate or manage threats)
b) The key concepts you will be addressing
c) What the reader can expect to find in the body of the report

The body of the report will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the report. Set priorities for identified threats from assessment 2, analyse the case in terms of identified risk categories and discuss specific resolutions and recommendations for improvements in the body of the report.

The conclusion (will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style

Attachment:- Mitigation Plan for Threat Report.rar

Reference no: EM132713097

Questions Cloud

Financial decisions : Imagine that you are on the board of directors of a church-based child care center. In order to stay profitable, the center will need to make budget cuts.
What is their velocity just after the collision : Two manned satellites approaching one another at a relative speed of 0.500 m/s intend to dock. The first has a mass of 2.50 ? 103 kg, and the second a mass
Record the acquisition of the equipment on March : AP Express Co. purchased equipment on March 1, 2019, for $95,000 on account. Record the acquisition of the equipment on March 1, 2019
Which pieces of information gives the strongest evidence : Which pieces of information gives the strongest evidence that availability of IRAs increases personal saving? IRA depositors in a given year tend
Mitigation plan for threat report based on knowledge : Mitigation plan for threat report based on knowledge you gained about threat types and key factors in Assessment 2. You are required to use the Assessment
Policies and procedures : Early childhood education administrators are responsible for setting and maintaining the policies and procedures of the child care center or school.
What the consumer would most likely : If the interest rate or rate of return on saving were higher but the required down payment amount stayed the same, the consumer would most likely
Prepare the journal entries for Marigold related to contract : Greig agrees to pay the full contract price of $2,080 on July 15, 2020. Prepare the journal entries for Marigold related to this contract
Find and make the shareholders equity section of statement : Assume that you are a common shareholder. If Kelly needed additional capital, would you prefer to have it issue additional common or preferred shares?

Reviews

Write a Review

Computer Graphics Questions & Answers

  1 relative positioning of objects in a windowthe program

1. relative positioning of objects in a windowthe program should draw a rectangle at the middle of the screen when

  Plot the vertices of a n-sided polygon

Using Java, Write a code that reads an integer n, followed by the coordinates of each of n points that are the vertices of a n-sided polygon. Plot the vertices and the lines that make up the polygon.

  Use audio narration to explain the materials

Example digital media projects include, A video using photos and audio narration to explain the materials necessary for completing the tutorial successfully

  Provide a network diagram and analyze it

You are not to provide a network diagram but a general narrative of what you recommend and the reason for it.

  Use motion graphics , color and fonts to complete cst

I want to use motion graphics , color and fonts. I need this complete by 6pm CST.Please Find below what I have done.

  Create a simple warm-up program using your g3d

Create a simple warm-up program using your G3D programming and graphics environment.

  Write program to animate two circles bouncing around window

Write a program to animate two circles bouncing around a window. The basic idea is to start the two circles somewhere in the interior of the window.

  How graphics will be used in the site

how graphics will be used in the site

  Illuminate the differences among ethics, morality, and law

Discuss the morality of posting the 32-character encryption key for HD-DVDs on Digg.com; the morality of terminating the poster's account; and the morality of re- posting the encryption key.

  Direct mapping

A block direct mapping cache has line/slot that contains 4 words of data. The cache size is 16k line. Main memory contains 16k blocks of 128 byte each.

  Design a program that show passing arguments byval and byref

Require to design a program that show passing arguments ByVal and then ByRef. It is suggested that I create a square function process and get an integer from the user then send it ByVal one time.

  Explain cohen sutherland line clipping algorithm

Explain cohen sutherland line clipping algorithm

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd