Decision on it security investments

Assignment Help Computer Network Security
Reference no: EM13806899

In 15 or more well-written and well-researched pages, explain the relative merits and challenges of Cybersecurity Standards. Discuss the merits of unified architectures vs. proprietary technologies in ensuring standards compliance and cybersecurity? (One application environment wherein unified architectures have been successful is in the production process control environment. ) A unified architecture is one wherein the software, systems, and environment are all built/purchased to be compliant with all standards for the environment and wherein there are no in-house (proprietary) non-standard solutions deployed. A unified architecture results in the use of a single hardware/software architecture configuration for all deployments in a given domain/environment of computing technology usage. Conversely, a proprietary deployment would be one in which the system is optimized for performance and in-house needs and may (or may not) be compliant with one or more standards.

More about unified architectures for process control systems.

In your paper discuss whether it is possible to formulate global standards that unify standards such as CMM and ISO 27001. Discuss the challenges posed to the development of global standards by cyberattack technologies. In the discussion of challenges posed to the development of global standards, be sure to reference the material covered in the Penetration Testing book by Weidman for examples of cyberattack technologies and penetration methods that the standards must address.

Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments? Support your position with evidence from the required readings as well as other sources and be sure to cite diligently. Describe real-world examples that help support your position.

The paper's page count is from the paper's Introduction to its Conclusion. The table of contents, section headings and sub-headings are required. The page count DOES NOT include the title page, the table of contents page, the references, and appendices. The page count also does not include additional sections such as an abstract.

The paper should include, at a minimum, the relative merits and challenges of the Cybersecurity Standards. It should also answer the questions above in depth.

At least 75% of the references should be based on official reports, scholarly studies, or peer-reviewed journal articles (IEEE, ACM, BlackHat, or similar).

Prepare your paper in Word format and submit it through your Assignments Folder. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Reference no: EM13806899

Questions Cloud

Project that involves procurement decisions : You have four vendors on the "short list" for a project that involves procurement decisions. They have virtually the same experience, have proposed similar project teams, and have excellent references.
Assignment on group therapy : Group therapy
What type of media is typically used for connectivity : What are the advantages and disadvantages of your selection? What type of media is typically used for connectivity? What are the performance specs in terms of reliability, speed capabilities, and nominal distance for reliable spans with the typica..
Are you using your computer to its full potential : Are you using your computer to its full potential? Research free online training sources available to teach you more about hardware and software.
Decision on it security investments : Discuss whether true unity is technically possible and why or why not If true unity is not technically possible, how should budgeters and policy-makers be guided to make the correct decision on IT Security investments?
What does the efficient market hypothesis imply for investor : What does the Efficient Market Hypothesis (EMH) imply for investors who buy and sell stocks in an attempt to beat the market? Now, suppose that two companies are looking at the same project. Company "A" has a beta of 1.5 and a cost of capital of 25%...
What is voip and how is it different from pots : Voice over the Internet Protocol (VoIP). What is VoIP and how is it different from the Plain Old Telephone Service (POTS)? What are some issues an organization (not individuals) should analyze when evaluating the move from a traditional phone sy..
Salesperson make about the product or service : What product or service did you ask about? What promises did the salesperson make about the product or service? What was the product guarantee?
Explain the main pros and cons in the debate about policies : In your initial post of at least 200-250 words, briefly summarize the national government's education policies. Explain the main pros and cons in the debate about these policies. Evaluate them from two perspectives

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

  Your company has assigned you the task

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivity, and functioning of the company's computer networks

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Examine the contents of the security and privacy tabs

Examine the contents of the Security and Privacy tabs. How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  What is the purpose of the diffie-hellman algorithm

Briefly compare and contrast how asymmetric cryptography is used to provide encryption as opposed to how it can be used to provide a digital signature.

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Compile a full draft of the final enterprise security plan

Compile a full draft of the final Enterprise Security Plan document. This will not be complete, but will have at least a short paragraph about each major section of the paper, including the suggested controls.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd