Identify the risks of most critical systems for organization

Assignment Help Computer Network Security
Reference no: EM131274171

Assignment

Description: Write a research paper (about 8-10 double spaced pages) based on your research and analysis of an organization of your choice.

1. It is best to choose an organization for which you have ability to do research - through interviews, publicly available information, audit reports, personal knowledge, reports and analyses done by other scholars. It is okay to use a generic name for an organization if you need to maintain confidentiality of the organization.

2. You may also choose a company or government agency that has suffered a data breach. Talk about breach and the cybersecurity issues before and after. How did they handle and protect data. Make recommendations. Think of OPM, Target, Neiman Marcus, Home Depot, Anthem, Community Health Systems, or almost any bank or Wall Street organization which has had data breaches for which a lot of information is readily available.

3. Identify the mission of the organization. As a cybersecurity professional you need to think of the business mission. Your primary role is to ensure success of the organization through a risk optimized digital strategy. In this section inform the reader what you feel is relevant for your story.

4. Identify the Risks of the most critical systems for the organization - this helps you to narrow down. For example the Point of Sale (POS) or the Patient Health Information Management system could be the most critical systems for some company. This will allow you to limit the scope of your analysis to the most critical systems. Otherwise the scope can become too large for a paper of this size.

5. Think of risks to data in all three states: Transmission, Processing, Storage

6. While identifying risks, discuss cybersecurity risks using Confidentiality, Integrity, and Availability terms. However tie it to overall business risks, which could be financial, market share, reputation loss, damages, legal fees, and other similar issues.

7. While identifying risks, while it is okay to concentrate on technical risks, do not ignore policy and people related risks.

8. Organizational structure and governance have been glaring weaknesses for many organizations such as OPM, Anthem, or Target. This is why looking at the cybersecurity leadership and overall organization structure of the organization may be very important to your analysis. For example are they missing key executives such as Chief Information Officer or Chief Information Security Officer. If these people are present, are they empowered to do their job or are some unqualified or inappropriate people such as a Chief Financial Officer overruling them at all times? Do they report to the CEO or board? When incidents happen who makes decisions? Who declares a disaster? Who informs law enforcement, media? Do they even have an Incident Response or Disaster Recovery Plan?

9. Your primary reading sources should be authoritative. NIST guidance is authoritative. Citable sources can be a judgment call - a couple of weaker sources for minor points when a whole bunch of other strong sources have been used for major points are frequently acceptable. CSO magazine would be a weak source - but may be usable to make a minor point. scholar.google.com and university library collections with IEEE/ACM papers and other research pieces are frequently good sources for scholarly pieces.

10. Include illustrations (figures) with APA compliant headings and citations to explain and support your arguments. Experiments data should be included while possible.

11. Prepare your paper in Word. Include a cover page, an abstract, and table of contents, introduction, main text with section headings and subheadings, conclusions, and a minimumof 7 references. Include in-text citations and a reference list at the end in APA compliant format.
The paper should your original writing. Use citations to support your work. Do not copy and paste entire paragraphs from other authors. While TurnitIn submission is no longer required, faculty has the option to check for paper originality rating. Plagiarism is seriously dealt with at UMUC.

Reference no: EM131274171

Questions Cloud

How you would implement such a plan logistically : Describe the characteristics of the culture you are planning a prevention program for. What is their background? Historically do they have a positive or a negative relationship with health care/prevention? Why is it important to implement a preve..
Describe the operations of drill down : Write a 2 to 3 page essay describing the use of an OLAP Data Cube. Your essay should also describe the operations of Drill Down, Roll Up, Slice, and Dice. Answer should be unique. Use APA format with proper citations.
Create a new project named stacktesting : Create a new project named StackTesting and create then the Stack interface and the two classes (ArrayStack and LinkedStack) written above.
Is addiction drug treatable using psychological techniques : What explanation can psychology give to explain the use of substances? Be sure to include the media influences that are represented in your poster (e.g., advertisements for the drug, or PSA clips against the drug) as well as information presented ..
Identify the risks of most critical systems for organization : Identify the Risks of the most critical systems for organization - this helps you to narrow down. For example Point of Sale or the Patient Health Information Management system could be most critical systems for some company.
Undergraduate discussion participation policies and rubric : Be sure to make your original post EARLY in the week. Return often throughout the week to reply and respond to your classmates. For more information about discussion grading criteria, visit the Undergraduate Discussion Participation Policies and Rubr..
Prepare aresearch paper on the pharmaceutical industry : Prepare aresearch paper on The Pharmaceutical Industry
Malware and secure coding : What should the average computer user (say, a college student like yourself) know about passwords, and what are good practices? Include choosing passwords, writing them down, letting a browser store them, changing them, and other aspects you can t..
Identify the independent and dependent variables : What were some variables the researchers controlled in their study? Why was this necessary? What evidence do the researchers offer as a test of their hypothesis? Is this evidence empirical (observable)? Is it valid? What explanation do the researcher..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Kerberos authentication protocol

Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication and Explain the PEAP protocol - how does it differ from EAP and what EAP deficiency does it address?

  Can you enter plain key or do you have to use the encrypted

Can you enter the plain (unencrypted) key or do you have to use the encrypted one in order for the contents of the encrypted "Cipher Text" text box to be unencrypted and displayed in the "Plain Text" text box?

  How do nist criteria for selection of des and aes

How do NIST criteria for selection of DES and AES relate to Shanon's original standards of a good cryptographic system? What are the significant differences? How do these standards reflect a changed environment many years after Shannon wrote his s..

  Explain primary tasks high-level investigation processes

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

  What are some of the considerations and issues

Discuss key management techniques. What are some of the considerations and issues? Give at least two examples of key management techniques.

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Discuss long-term initiatives to encourage positive change

In order to implement a few immediate measures to effect positive changes, what recommendations should cyber security professionals follow -  Critically discuss long-term initiatives to encourage positive change with regards to assessing security ..

  Define cyber-attack simulator systems

Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.

  Write the word statistic without the repeated letters

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters. In this case, the message HELLO becomes ECJJM.

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  Discuss the major networking building blocks

Discuss the major networking building blocks and their functions. Secondly, discuss software application's vulnerabilities, such as those found in web browsers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd