Why should businesses invest in cybersecurity

Assignment Help Basic Computer Science
Reference no: EM131368441

Case Study #1: Why should businesses invest in cybersecurity?

Case Scenario:

A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity. The purpose of this white paper is to "fill in the gaps" in a business case that was already prepared by the company's Chief Information Officer. The target audience for your paper is the company's C-suite executives. These executives will be meeting later this month to discuss budget requests from department heads. The company has requested that your white paper use the same investment categories as are already in use for the CIO's business case: people, processes, and technologies.  

Research:

  • Read / Review the Week 1 readings.
  • Find three or more additional sources which provide information about best practice recommendations for cybersecurity and other reasons why businesses should invest in people, processes, and technologies related to cybersecurity. These additional sources can include analyst reports (e.g. Gartner, Forrester, Price-Waterhouse, Booz-Allen) and/or news stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc.

Write:

Write a two to three page summary of your research. At a minimum, your summary must include the following:

An introduction or overview of cybersecurity which provides definitions and addresses the business need for cybersecurity. This introduction should be suitable for an executive audience.

A separate section which addresses ethical considerations which drive the business need for investments in cybersecurity.

A review of best practices and recommendations which can be added to the existing business case to provide justification for cybersecurity-focused investments in the three investment categories identified by the company: people, processes, and technologies.

Your white paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.

Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.

You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131368441

Questions Cloud

Small business from a traditional retail store : One difficulty of moving a small business from a traditional retail store to an online store is channel complications. In many cases, everything has to be reconsidered. For example, how will you communicate with your customers? How will they find ..
Strategic diversity education for management : Determine whether the research plan meetsthe scientific merit criteria. Each performance level is described for each"core" criteria in the rubric - Write a brief statement regarding the need for the study that fully describes the problem or need b..
Describe how the elements fit together : In your own words, describe how the elements fit together. Choose one element from the list below and give a real life example that demonstrates how enterprise data management relates to the element.
What approach firefighters might use to fight this type : Ethanol Fires can be difficult to extinguish. Discuss why this is true and what approach firefighters might use to fight this type of fire.Your total response must be at least 200 words in length. All sources used, including the textbook, must be ..
Why should businesses invest in cybersecurity : A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity.
Write a narration essay on one of the given topic : Write a narration essay on one of the topics from the list provided.- Narration is one of the most common types of professional writing, and it seeks to answer the basic question "What happened?"
Specify one controversial corporate social responsibility : Specify one controversial corporate social responsibility concern associated with Apple or approved organization. Submit a reference page with at least four quality references that you have used for this presentation / paper.
Description of the disease or disorder - eye diseases : HLTEN515B Implement and monitor nursing care for older clients. Candidates need to research one disease/disorder, from each of the following areas, in relation to the older person - Eye diseases, Oral cavity diseases and Skin diseases
Discuss about the post given below : Our body makes energy from the carbohydrate and lipid present in the food we eat and drink. Glucose is our body's preferred energy source but fatty acids provide an alternative energy source when needed. This forum will explore deeper several to..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Data warehouse design

Data WareHouse Design

  Determine scycle if the thermal efficiency is 75

A system executes a power cycle while receiving 2000 Btu by heat transfer at a temperature of 1000 R and discharging energy by heat transfer at a temperature of 500°R. There are no other heat transfers.

  Write a program that asks user to enter a number of seconds

There are 86,400 seconds in a day. If the number of seconds entered by the user is greater than or equal to 86,400, the program should display the number of days in that many seconds.

  Draw the corresponding lfsr for each of the three polynomial

Draw the corresponding LFSR for each of the three polynomials. Which of the polynomials is primitive, which is only irreducible, and which one is reducible? Note that the lengths of all sequences generated by each of the LFSRs should add up to 2m ..

  Why the strategy for storing check constraint values

Explain why the strategy for storing CHECK constraint values in a separate table is better than implementing them in a table-based constraint. How can this strategy be used to implement the constraint on ARTIST. Nationality?

  Program using an array

The array contains the hours worked for 5 employees. These hours are entered by the user. All employees earn the same hourly wage. The program will calculate the gross pay for each employee.

  Display the lowest number of moves

Display the lowest number of moves it took for the mole to escape and how many times did the mole escape in that fewest number of moves?

  Determining the presentation fundamentals

Resources: "Presentation Fundamentals" with Tatiana Kolovou on Lynda.com, Instructions for Completing a Video Technology managers look for three critical fundamental skills from the IT professions hired today:

  How many pseudo random numbers will we need per path

Suppose we wish to price an Asian option with N look-at dates with a Variance Gamma model using Monte Carlo. How many (pseudo-)random numbers will we need per path?

  How many copies of the sierpinski triangle

How many copies of the Sierpinski Triangle do you need to build a version that is twice as large?

  Explain internal processes that grant authority for machine

Explain the internal processes that grant authority for the machine to proceed with transactions by using this card. Describe how you would first make the structure for this database. Describe what is meant by systems life cycle Describe how you woul..

  Find the average heat transfer coefficient

Atmospheric air at a velocity of 61 m/s and a temperature of 16°C enters a 0.61-m-long square metal duct of 20-cm x 20-cm cross section. If the duct wall is at 149°C, determine the average heat transfer coefficient. Comment briefly on the LD/h eff..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd