What risks do such assumptions pose

Assignment Help Basic Computer Science
Reference no: EM132393585

Submit (300 to 400 words) research post for each part. All sources must be cited properly using APA formatting (At least 2).

Part 1. There is a startup company called Extreme Unlimited, and they are in the process of hiring new employees due to recent demand for their product. Extreme Unlimited boasts that it can secure any organization with its array of cybersecurity products. However, in their rush to hire, their HR department does not require new employees to go through security awareness training. They assume since they are hiring cybersecurity professionals this step is not required.

What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?

Part 2. Assessing risk begins with baselining, establishing a current state to get to the desired state. Progress is measured by meeting milestones and objectives, i.e. a maturing process. For example, the capability maturity model has the following framework:

1) Initial - informal

2) Documented Strategy & Principles - formalizing

3) Adaptive Security Architecture - well defined

4) Security Organization & Roadmap - optimized

5) Baseline Security Standards - quantitatively controlled

Give examples of risk at the level of these categories and how each level mitigates risks from the previous level?

Part 3. In today's world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats?

Reference no: EM132393585

Questions Cloud

Compare and contrast gdpr and coppa privacy regulations : Compare and contrast GDPR and COPPA privacy regulations. In your initial post include 2 articles to support your views on the differences and similarities,
Stride-per-element and stride per-interaction : Compare and contrast the three STRIDE variants of (a) STRIDE-per-Element, (b) STRIDE per-Interaction, and (c) Desit.
How would an attacker break caesar-style cipher : Although the Caesar cipher is easy to use, it is easy to crack. How would an attacker break a Caesar-style cipher?
Explain certain features of visualization : According to Kirk (2016), viewers need some assistance consuming visualizations. Annotations can be used to help explain certain features of a visualization
What risks do such assumptions pose : What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?
Characteristics of a successful ig program : Chapter 3 starts with the identification and the introduction of the Principles, and the characteristics of a successful IG program.
Explain how you would reduce potential vulnerabilities : Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
Does this represent effective risk management program : What represents the key success factors of the ERM program? Does this represent an effective risk management program?
Developing intimacy with your data : This exercise involves you working with a dataset of your choosing. Visit the Kaggle website, browse through the options and find a dataset of interest,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Three component layers of cloud computing

Consider the three component layers of cloud computing, and explain how each layer of technology is related. Ensure that each layer is addressed.

  Create a structure named apartment

Create a structure named Apartment that contains data fields to hold the number of bedrooms, the number of baths, and the monthly rent for the apartment. Write a program that creates an apartment object and prompts the user for a number of bedroom..

  Under-over valued stock

A manager believes his firm will earn a 10.90 percent return next year. His firm has a beta of 1.36, the expected return on the market is 8.6 percent

  What is the probability that a patient at this clinic

What is the probability that a patient at this clinic has been diagnosed with osteoarthritis OR hypertension?

  Construct a structure chart, as well as a flowchart

Construct a structure chart, as well as a flowchart and pseudocode,for the following problem. Assume that input record contains a taxpayer's name, the value of personal property belonging to taxpayer, and a code defining the type of a personal ..

  What is the modern method for separating style

What is the modern method for separating style and structure when constructing a web page? How can you get a graphic image on the web stored on the hard disk of your PC

  Method called compress that replaces every pair of element

For example, if the list stores [1, 7, 3, 9, 4, 6, 5], your method should change it to store [8, 12, 10, 5] (1 + 7, then 3 + 9, then 4 + 6, then 5).

  Dead weight loss if the market is a monopoly

What would be the consumer surplus if it was perfectly completive market? Whats the Dead weight loss if the market is a monopoly?

  Converting each of the forms of to relational algebra

Give a rule for converting each of the following forms of to relational algebra. All conditions may be assumed to be applied (by a two-argument selection) to a relation R. You may assume that the subquery is not correlated with R. Be careful that ..

  What other justifications for this requirement can you think

What other justifications for this requirement can you think of?

  Declares several circle objects

Declares several Circle objects

  Possible confidence intervals that contain

This interval, 38 minutes 42 minutes, can be one of the 95% of all the possible confidence intervals that contain the true population mean time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd