What are the most significant threats to your data

Assignment Help Computer Network Security
Reference no: EM13667323

Read the following scenario and use it as the basis for your answers to the associated essay questions:

Scenario

You are an information system security professional for CCS International, a company that provides IT personnel for a variety of government and private contracts. The organization to which you are currently contracted hires a new chief security officer (CSO) after the previous CSO retires. Although the new CSO is in charge of security for the organization's data assets, networks, and computer systems, her background and most recent experience is in physical security, and she knows very little about information security. Your manager explains that you have been assigned the task of preparing an information brief for the new CSO, which will provide her with the basics of cyber security, acquaints her with the current threats facing your organization's data infrastructure, and the legal issues related to protecting the enterprise. Prepare a slide presentation covering (at a minimum) the following topics:

  • What is cyber security, and what are some of its key concepts?
  • What are the most significant threats to your data, and what are some of the root causes of those threats?
  • Are cyber criminals a real danger to your enterprise? Why or why not?
  • What is risk management, and how can the risk management process help you protect your infrastructure and data?
  • What are some computer security best practices that you would recommend, and how will they help protect your IT assets?
  • If your organization does become a victim of a cyber-crime or a security incident, how will you respond? What types of evidence would be important to your investigation, and how would they be used? What would law enforcement's role be in your incident response plan?
  • Are there any laws at the local, state, federal, or even international level that protect your organization by imposing penalties on cyber criminals? Provide at least one example of a cyber-crime court case, and explain both its outcome and its significance.
  • What do you need from the CSO to best protect your organization? Justify your requests.

Assignment

Prepare a 15- to 20-slide presentation addressing the scenario and covering the topics above. Ensure that you create a title slide for your presentation (not included in the 15- to 20-slide count) displaying your name, the course title, and the date of submission. Be sure to use a background and fonts appropriate for your meeting with the CSO.

Prepare a script to go along with the slide presentation that could be read to provide an in-depth discussion of the topics highlighted on the slides. Research the topics above, using your textbook, information provided in class, and resources provided by the UMUC library or textbooks from previous courses. Your script should be written in an academic format, should be logically organized (e.g., introduction, body, and conclusion), and should include the following:

- a cover page with your name, the course title, and the date of submission

- an introductory section that explains the purpose of the presentation

- the body of the paper, addressing the topics discussed in your slides

- a conclusion section that summarizes your discussions

- a References page in which you reference the text or other sources, which must be properly documented and cited, using APA formatting

The script must be a minimum of 10 double-spaced, computer-generated pages in length, using a 12-point font, with 1-inch page margins (top, bottom, right, and left). There must also be a cover page and a References page; these two pages will not count toward the required page total.

Verified Expert

Reference no: EM13667323

Questions Cloud

Find the power delivered by the person pulling on the rope : A 6.2 kilogram box is being lifted by means of a light rope that is threaded through a single, light, frictionless pulley that is attached to the ceiling. find the power delivered by the person pulling on the rope
Determine the tension in the string at instant of projection : A particle of mass 3 kilogram is attached to the end of a ring of length 4meter, whose other end is fixed. determine the tension in the string at the instant of projection
How does the leadership respond : How does the leadership respond?
Explain what other properties these solutions have in common : Determine two aqueous solutions one of sucrose and the other of nitric acid. Both solutions freeze at -1.5 degree Celsius. Explain what other properties these solutions have in common
What are the most significant threats to your data : What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - are cyber criminals a real danger to your enterprise? Why or why not?
Determine the retarding force acting on the car : A car of mass 1200 kilogram is traveling at 28.0 m/s. Determine the retarding force acting on the car
How political is your organization really : What power structures exist in your organization, and how are they managed? Look at the individuals in positions to do something; how do they act? Those close to the decision-makers, how do they use the power of those they report to? How political is..
Explain what is better for cleaning when a hard water : Explain what is better for cleaning when a hard water is used a soap or a detergent and why
Find how much energy is stored in the capacitor : A 40-pF capacitor is immersed in silicone oil, which has a dielectric constant of 2.6. Find how much energy is stored in the capacitor

Reviews

Write a Review

Computer Network Security Questions & Answers

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  Xyz company xyz a mid-sized corporation is in the middle of

company xyz a mid-sized corporation is in the middle of satisfying their regulatory compliance needs. the manager of

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  Explain about cnss model

The CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.

  A determine the elements of the risk management framework b

to foster and develop national preparedness and encourage the exploration of risk related interdependencies across the

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd