Discuss the current it cybersecurity policy

Assignment Help Computer Network Security
Reference no: EM13758251

The primary purpose of this project is for you to demonstrate your understanding of the principles covered in this course. You will create a minimum 12 PowerPoint slides to summarize the policy review conducted and your recommendations for the next steps the merged company should take to protect its data and information assets. The cover, summary/conclusion and reference slides are not part of the slide count. It will also include a minimum of 5 references.

Each policy review and recommendations presentation should address the following:

Current policy: Discuss the current (as per the case study) IT cybersecurity policy.

New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy. Identify cybersecurity vulnerabilities that could be introduced by the new technology that might not be mitigated by technological configuration management.

Recommendations: Discuss revisions and modifications that must be made to the current IT cybersecurity policy to ensure that the new technology does not compromise the organization's cybersecurity posture. Address the inter- and intra-organization leadership, managerial, and policy challenges and effects associated with the recommendations.

Create 10-12 Power Point Slides that summarize the security policies you are recommending be implemented based upon the case study.

Reference no: EM13758251

Questions Cloud

Provide the owner with a reasonable rate of return : A business should provide the owner with a reasonable rate of return based upon:
What is the implied service rate : What is the implied service rate at a bank teller window if customer demand is 34 customers per hour, two bank tellers are on duty, and their labor utilization is 85%?
Quality planning-quality assurance and quality control : What is Quality? Describe the elements of Quality Planning, Quality Assurance, and Quality Control. Why are these elements important to successful project completion?
Strategic leadership and entrepreneurship analysis : What is your sphere of influence in your organization? Based on this, what impact can you have on the implementation of your business plan? What is your own bias? What hurdles do you anticipate? What leadership style(s) will you have to demonstrate? ..
Discuss the current it cybersecurity policy : Current policy: Discuss the current (as per the case study) IT cybersecurity policy. New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy
Given that making revenue policy is typically responsibility : Given that making revenue policy is typically the responsibility of elected officials, what are the roles and responsibilities of managers with respect to the administration of taxes and other revenues?
Development methods and tools : Describe alternative development methods and tools that augment development methods
What characteristic of the organization : What characteristic of the organization (target) have contributed to its success or lack success in the international marketplace?
Definitely changed the marketing landscape : The immediacy of technological communications has definitely changed the marketing landscape in many ways. Another thing to consider is that the Internet certainly gives way for more third-party vendors to enter the picture. We appreciate your contri..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss specific malware and social engineer attacks

Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Describe how bob can recover the message

Describe how Bob can recover the message - Through how many ciphertext blocks is this error propagated? What is the effect at the receiver?

  What are the specific limitations of a computer system

1. what are the specific limitations of a computer system that provides no operating system? what must be done to load

  What are the common tools used for denial of service

What are the common tools used for denial of service and How does a SQL injection attack take place

  Prevent software upgrade problems

What precautions did the organizations in the case take to prevent software upgrade problems? To what extent do you believe those precautions helped?

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Examine the quick finance company network diagram and

above is the quick finance company network diagram. the company is a small business and does not invest much in

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Rsa public key cryptography standards

Choose one of the standards that you have interest and describe what it does, if possible have some discussion on it. You may usehttp://www.sis.uncc.edu/~yonwang/papers/pkcs.pdf as a reference.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd