Reference no: EM132393585
Submit (300 to 400 words) research post for each part. All sources must be cited properly using APA formatting (At least 2).
Part 1. There is a startup company called Extreme Unlimited, and they are in the process of hiring new employees due to recent demand for their product. Extreme Unlimited boasts that it can secure any organization with its array of cybersecurity products. However, in their rush to hire, their HR department does not require new employees to go through security awareness training. They assume since they are hiring cybersecurity professionals this step is not required.
What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?
Part 2. Assessing risk begins with baselining, establishing a current state to get to the desired state. Progress is measured by meeting milestones and objectives, i.e. a maturing process. For example, the capability maturity model has the following framework:
1) Initial - informal
2) Documented Strategy & Principles - formalizing
3) Adaptive Security Architecture - well defined
4) Security Organization & Roadmap - optimized
5) Baseline Security Standards - quantitatively controlled
Give examples of risk at the level of these categories and how each level mitigates risks from the previous level?
Part 3. In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats?
Compare and contrast gdpr and coppa privacy regulations
: Compare and contrast GDPR and COPPA privacy regulations. In your initial post include 2 articles to support your views on the differences and similarities,
|
Stride-per-element and stride per-interaction
: Compare and contrast the three STRIDE variants of (a) STRIDE-per-Element, (b) STRIDE per-Interaction, and (c) Desit.
|
How would an attacker break caesar-style cipher
: Although the Caesar cipher is easy to use, it is easy to crack. How would an attacker break a Caesar-style cipher?
|
Explain certain features of visualization
: According to Kirk (2016), viewers need some assistance consuming visualizations. Annotations can be used to help explain certain features of a visualization
|
What risks do such assumptions pose
: What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?
|
Characteristics of a successful ig program
: Chapter 3 starts with the identification and the introduction of the Principles, and the characteristics of a successful IG program.
|
Explain how you would reduce potential vulnerabilities
: Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
|
Does this represent effective risk management program
: What represents the key success factors of the ERM program? Does this represent an effective risk management program?
|
Developing intimacy with your data
: This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest,
|