Project on supply chain risk analysis

Assignment Help Computer Network Security
Reference no: EM132568797 , Length: 8 pages

CSIA 350 Cybersecurity in Business & Industry - University of Maryland Global Campus

Project: Supply Chain Risk Analysis

For this project, you will research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry.To begin, you will need to explore through the readings the concepts of global supply chains and global cooperation for cross-border trade in goods and services. Then, you will need to investigate due diligence and other business processes / strategies which can be used to mitigate the impacts of supply chain risk for companies who produce and sell cybersecurity related products and services.

Research

1. Global Supply Chain Risks affecting the Cybersecurity Industry. Here are some suggested resources to get you started:

2. Read the following articles / documents which focus on international cooperation and capacity building for cybersecurity:

3. Investigate due diligence as it applies to the purchase of components or services from vendors. Answer the question: how can due diligence processes help a company manage supply chain risks? Here are some suggested resources:

4. Research best practices and recommended strategies and approaches for managing global supply chain risk
a. Best Practices in Cyber Security Supply Chain Risk Management
b. Supply Chain Cybersecurity: Experts on How to Mitigate Third Party Risk
c. 5 Cybersecurity Best Practices for your Supply Chain Ecosystem

Write

1. An introduction which addresses the reasons why cooperation on a global basis is required to address cybersecurity related risks in global supply chains for products and services. Your introduction should include a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

2. A supply chain riskssection in which you identify and describe 5 or more specific sources of supply chain risk which impact cybersecurity related products and services.

3. A due diligence section in which you address the use of diligence processes (investigating suppliers before entering into contracts) as a supply chain risk management strategy. Include 5 or more cybersecurity related questions which should be asked of suppliers during the due diligence process.This section should include discussion of political, economic, and social factors which impact management of supply chain risk.

4. A best practicessection in which you address 5 or more best practices for managing global supply chain risks in the cybersecurity industry. You must also provide an evaluation of the expected benefits from implementing each of these practices.

5. A summary and conclusions section in which you present an overall picture of the supply chain risk problem in the cybersecurity industry and best practices for managing supply chain risks.

Attachment:- Supply Chain Risk Analysis.rar

Reference no: EM132568797

Questions Cloud

How to estimate the change in the company operating income : Using the CM ratio, calculate the break-even level of sales? Estimate the change in the company's operating income if it increased its total sales by $20,000.
Discuss the background of western culture : Western Society Explain in detail what is meant by "western society/culture?
Discuss four types of situational leadership styles : Discuss the four types of situational leadership styles proposed by Hersey and Blanchard.
How much is Turnbull Manufacturing total cost : Beginning work in process inventory $35,000. How much is Turnbull Manufacturing's total cost of work in process for the year
Project on supply chain risk analysis : CSIA 350: Cybersecurity in Business and Industry - research and report upon the problem of Supply Chain Risk as it pertains to the cybersecurity industry
Justify the timeline for your program evaluation : To complete this additional section of the Course Project: Create a Gantt or PERT Chart, and narrative paragraphs that: Justify the timeline for your program.
How many training classes should the company hold each year : Viewing new drivers, How many training classes should the company hold each year? What is the total annual cost of your recommendation?
Identify a problem or issue related to practice : Identify a problem or issue related to practice, policy, population, or education that aligns with the organizational
Compute the net cash provided by investing activities : Dividends paid to preferred stockholders? $500,000. Compute the net cash provided (used) by investing activities during 2018

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify suitable products that could used to resolve issues

Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues.

  Description of a couple of cloud services

Develop a paper for him, at least 2 pages (1.5 spaced) in length, font 12, that discusses the different types of cloud computing, provide him with the description of a couple of cloud services which would be applicable to email, one of them which ..

  How the enigma machine has changed the world of security

In this essay, you will explain how the Enigma machine has changed the world of security to this day. You will provide a timeline of the major milestones.

  Discussion on mobile users and data security

The Topic is: Mobile users and data security. Defend your choice of topic in 500 words or more. Include at least 3 expert supporting quotes surrounded.

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  How many fiu webpages contain admin in the url

Search to find how many FIU webpages contain admin in the URL (hint: must combine multiple directives) Record how many hits found and explain why this would be valuable in conducting reconnaissance, what do we learn or find out? Try

  Design effective organization cybersecurity standards

Describe some likely instances that demonstrate when the gathering of meta-data by businesses within this example industry may not be good for the customer.

  Discuss dns and procedures for configuring dns zones

Discuss procedures for configuring and using Encrypting File System (EFS). Discuss procedures for configuring and implementing Advanced Audit Policies. Discuss DNS and procedures for configuring DNS Zones.

  Define the security strategies of defense in depth

In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy

  Explain how you would handle the given situation

You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation.

  Illustrate the possible placement of servers

Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers,

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd