Discuss the current it cybersecurity policy

Assignment Help Computer Network Security
Reference no: EM13758251

The primary purpose of this project is for you to demonstrate your understanding of the principles covered in this course. You will create a minimum 12 PowerPoint slides to summarize the policy review conducted and your recommendations for the next steps the merged company should take to protect its data and information assets. The cover, summary/conclusion and reference slides are not part of the slide count. It will also include a minimum of 5 references.

Each policy review and recommendations presentation should address the following:

Current policy: Discuss the current (as per the case study) IT cybersecurity policy.

New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy. Identify cybersecurity vulnerabilities that could be introduced by the new technology that might not be mitigated by technological configuration management.

Recommendations: Discuss revisions and modifications that must be made to the current IT cybersecurity policy to ensure that the new technology does not compromise the organization's cybersecurity posture. Address the inter- and intra-organization leadership, managerial, and policy challenges and effects associated with the recommendations.

Create 10-12 Power Point Slides that summarize the security policies you are recommending be implemented based upon the case study.

Reference no: EM13758251

Questions Cloud

Provide the owner with a reasonable rate of return : A business should provide the owner with a reasonable rate of return based upon:
What is the implied service rate : What is the implied service rate at a bank teller window if customer demand is 34 customers per hour, two bank tellers are on duty, and their labor utilization is 85%?
Quality planning-quality assurance and quality control : What is Quality? Describe the elements of Quality Planning, Quality Assurance, and Quality Control. Why are these elements important to successful project completion?
Strategic leadership and entrepreneurship analysis : What is your sphere of influence in your organization? Based on this, what impact can you have on the implementation of your business plan? What is your own bias? What hurdles do you anticipate? What leadership style(s) will you have to demonstrate? ..
Discuss the current it cybersecurity policy : Current policy: Discuss the current (as per the case study) IT cybersecurity policy. New technology: Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy
Given that making revenue policy is typically responsibility : Given that making revenue policy is typically the responsibility of elected officials, what are the roles and responsibilities of managers with respect to the administration of taxes and other revenues?
Development methods and tools : Describe alternative development methods and tools that augment development methods
What characteristic of the organization : What characteristic of the organization (target) have contributed to its success or lack success in the international marketplace?
Definitely changed the marketing landscape : The immediacy of technological communications has definitely changed the marketing landscape in many ways. Another thing to consider is that the Internet certainly gives way for more third-party vendors to enter the picture. We appreciate your contri..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Bring voice over internet protocol to the entire

paper in apa format with labels for each section to include an introduction main topicbody and sub-topics and

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Describe how use of equipment software and multiplexing

write a 4-7 page paper including the followingmiddot analyze the current options available for use of tcpip and

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  Outline a plan for the growth of an addressing and naming

outline a plan for the development of an addressing and naming model in an environment of the following scenarioten 10

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  Analyze the impact of security breaches

1. you need to select a particular security breach that happened in the recent past. You need to search the Internet to find a security breach that you can analyze. Once you select a particular security breach to work on, other students cannot ..

  Explain decryption speed

Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..

  What is the significance of nevis island

What is the significance of Nevis Island and what is the significance of Stella's message to Fiona asking for interest rates?

  How many fiu webpages contain admin in the url

Search to find how many FIU webpages contain admin in the URL (hint: must combine multiple directives) Record how many hits found and explain why this would be valuable in conducting reconnaissance, what do we learn or find out? Try

  Write an information security white paper

Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd