Develop and implement the capstone project

Assignment Help Computer Network Security
Reference no: EM132690236

TASK : DESIGN AND DEVELOPMENT

Capstone
The graduate integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional ?eld.

INTRODUCTION
In this task, you will design, develop, and implement the capstone project approved by your course instructor. You will compile the information for your solution into a report based on the prompts below.
Your work for this task will not be evaluated until the appropriate forms from Task 1 have been submitted and evaluated.

Note: You have full access to the cybersecurity tools that can be found on the WGU Cyber Range, but you are not required to use them.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless speci?ed in the task requirements. All other submissions must be ?le types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Write an executive report that includes the following requirements:
• the security problem under investigation
• background information about the problem
• a root cause analysis of the problem

• a description of the stakeholders
• an analysis of systems, processes, or both
• a description of the project requirements
• the data available or the data that needs to be collected to support the project
• the industry-standard methodology you used to guide and support the solution's design and development
• deliverables associated with the design and development of the technology solution
• the strategy for implementing the solution and anticipated outcomes from the project, including phases of the rollout, details of project launch, and training plan for users
• the quality assurance plan for the solution, including formative and summative evaluation plans and plans for revision
• assessment of risks associated with the implementation
• the technology environments, tools, and any related costs, as well as the human resources, that are necessary to execute each project phase
• a projected timeline, including milestones, start and end dates, duration for each milestone, dependencies, and resources assigned to each task
• the framework that will be used to assess the success of the project and assess if the security solution meets stakeholder's needs, including test cases and acceptance criteria

B. Design and develop a technology-supported security solution that addresses your identi?ed business problem or organizational need.
1. Your solution must contribute to at least one of the following major security areas: Cyberlaw, Regulations, and Compliance
Leadership and Professionalism Security Planning and Management Systems Security
2. Provide a summary that explains how your solution meets the following criteria:
• facilitates the development of consensus-based codes of conduct
• promotes the adoption of standards and practices
• promotes automation in cybersecurity
• improves and modernizes security assurance
• implements industry-standard security tools and infrastructure or environment
• collects digital evidence, including data for analysis or forensics
• provides cybersecurity plans, strategies, and policies
• implements con?dentiality, integrity, and availability
• mitigates cybersecurity threats
• investigates cybersecurity incidents or crimes
• includes decision-support functionality
• provides a training plan for users

C. Create each of the following forms of documentation for the solution you have developed:
• a subset of comprehensive elements of cybersecurity plans, policies, standards, or procedures
• analysis of the alignment of the solution with organizational cybersecurity initiative or regulatory compliance
• assessment of the solution's implementation, including testing results and implemented revisions
• applications, tools, installation, and user guides for any other environment used
• WGU Cyber Range artifacts (if applicable)
• assessment of the ef?ciency of the solution
• post-implementation systems and process analysis, including diagrams or descriptions of the environment
• post-implementation risk assessment

• analysis of collected data
• analysis of the ?nal output
• stakeholder impact analysis
• post-implementation and maintenance plans for the solution, including supporting resources
• the results from the solution testing and revisions
• training plan for users
• control de?ciencies analysis that includes a plan of action and milestones
• source code and executable ?les, with installation and user guides, if applicable
• applications, tools, installation, and user guides for the WGU Cyber Range or any other cyber security testing environment used
• artifacts from the domain your solution addresses (listed below)

Domain: Cyber Risk Management and Oversight

- organization chart
- cybersecurity-related policies and procedures
- strategic plans
- cybersecurity job descriptions
- cybersecurity personnel quali?cations
- risk assessments
- data loss prevention analysis
- IT audit schedule
- IT audit reports and correspondence
- audit exception tracking
- risk management reports
- cybersecurity training policies and procedures
- cybersecurity training and awareness materials

Domain: Cybersecurity Controls

- list of physical access controls (e.g., key cards, biometric controls, video cameras)
- baseline security con?guration standards
- vulnerability or patch management policies and procedures
- patch management reports
- penetration test results and reports
- vulnerability assessments
- continuous monitoring strategy

Domain: External Dependency Management

- list of third parties and subcontractors
- contracts governing all third-party relationships
- inventory of all third-party connections
- network topology/diagram
- independent reports on the service provider's security controls
- remote access logs
- third-party employee access reviews
- vendor management policies and procedures

Domain: Threat Intelligence and Collaboration

- list of threat intelligence resources (e.g., industry groups, consortiums, threat and vulnerability reporting services)
- management reports on cyber intelligence

Domain: Cyber Resilience

- cybersecurity event log and reports on cyber incidents
- business impact analysis
- business or corporate continuity plan
- results of resilience testing
- resilience testing reports
- cyber incident response plans
- crisis management plans
- data loss prevention analysis
- continuous monitoring strategy

D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

E. Demonstrate professional communication in the content and presentation of your submission.

Attachment:- Performance Assessment.rar

Reference no: EM132690236

Questions Cloud

Describe various types of community fire and life safety : Develop knowledge and skills on how to Prevent, Protect and Respond to various types of fire and rescue incidents - practical firefighter skills necessary
SEC4204 Fundamentals in Computer Programming Assignment : SEC4204 Fundamentals in Computer Programming Assignment Help and Solution, HND in Computing and Software Engineering - Assessment Writing Service
SEC4206 Fundamentals in Networking : SEC4206 Fundamentals in Networking Assignment Help and Solution, HND in Computing / Network Engineering - Assessment Writing Service
Explore data management techniques and apply : Explore data management techniques and apply when and where applicable and Analyse and apply data issues in an organisational context.
Develop and implement the capstone project : Develop, and implement the capstone project approved by your course instructor. You will compile the information for your solution into a report
Discuss belief in the domain of human resource management : A well placed employee will be an asset to the organization. Proper placement makes the employee happy and reduces absenteeism and labor turnover.
Plan how you will structure your ideas for your report : Research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development
Discussing the issue of motivating employees : Compare how two companies, within the same industry, approach a specific business issue in the workplace. Acceptable issues
What are some of the advantages of online recruiting : What are some of the advantages of online recruiting as opposed to traditional recruiting? What are some of the disadvantages of using Zip recruiter.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd