Vulnerability scans and effective risk management protocols

Assignment Help Business Management
Reference no: EM13921229

Choose an organization from the choices provided and prepare a security plan that provides security awareness policy using a security policy framework outline and according the Critical Infrastructure document which concentrates on the following integral keywords to cover the necessary elements of an organization security plan. These are: Identify, Protect, Detect, Respond, and Recover. The plan is a capstone of the work that you have accomplished in this course. You will use your outline to guide the outcome of the plan in addition to the keywords. The plan is an enterprise policy that includes the following considerations, analysis approach, and protections for the enterprise:

Identify threats and vulnerabilities.

Assign appropriate security controls to protect the infrastructure of the organization.

Prepare vulnerability scans and effective risk management protocols to ensure protections remain current and effective and detect any issues.

Initiate an incident response plan for responding to problems.

Develop a business continuity and disaster recovery plan to recover from interruptions in business whether manmade or geographical.

This plan must be completed and submitted in MS Word format. Choose from one of the organizations below or request approval from your instructor via email for an alternate organization:

• Department of Defense
• Department of Homeland Security
• General Dynamics Information Technology
• JC Penney's Corporate Office
• University of Maryland
• ITT Technical Institute
• United States Marine Corp

From the Critical Infrastructure document, align your organizational plan to reflect the intent of the document as follows from an excerpt taken from the document and ensure you read the document in its entirety:

"The Framework complements, and does not replace, an organization's risk management and cybersecurity program. The organization can use its current processes and leverage the Framework to identify opportunities to strengthen and communicate its management of cybersecurity risk while aligning with industry practices. Alternatively, an organization without an existing cybersecurity program can use the Framework as a reference to establish one.

Just as the Framework is not industry-specific, the common taxonomy of standards, guidelines, and practices that it provides also is not country-specific. Organizations outside the United States may also use the Framework to strengthen their own cybersecurity efforts, and the Framework can contribute to developing a common language for international cooperation on critical infrastructure cybersecurity."

Overview of the Framework:

The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profiles. Each Framework component reinforces the connection between business drivers and cybersecurity activities. These components are explained below.

• The Framework Core is a set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors. The Core presents industry standards, guidelines, and practices in a manner that allows for communication of cybersecurity activities and outcomes across the organization from the executive level to the implementation/operations level. The Framework Core consists of five concurrent and continuous Functions-Identify, Protect, Detect, Respond, Recover. When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization's management of cybersecurity risk. The Framework Core then identifies underlying key Categories and Subcategories for each Function, and matches them with example Informative References such as existing standards, guidelines, and practices for each Subcategory.

• Framework Implementation Tiers ("Tiers") provide context on how an organization views cybersecurity risk and the processes in place to manage that risk. Tiers describe the degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware, repeatable, and adaptive). The Tiers characterize an organization's practices over a range, from Partial (Tier 1) to Adaptive (Tier 4). These Tiers reflect a progression from informal, reactive responses to approaches that are agile and risk-informed. During the Tier selection process, an organization should consider its current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints.

• A Framework Profile ("Profile") represents the outcomes based on business needs that an organization has selected from the Framework Categories and Subcategories. The Profile can be characterized as the alignment of standards, guidelines, and practices to the Framework Core in a particular implementation scenario. Profiles can be used to identify opportunities for improving cybersecurity posture by comparing a "Current" Profile (the "as is" state) with a "Target" Profile (the "to be" state). To develop a Profile, an organization can review all of the Categories and Subcategories and, based on business drivers and a risk assessment, determine which are most important; they can add Categories and Subcategories as needed to address the organization's risks. The Current Profile can then be used to support prioritization and measurement of progress toward the Target Profile, while factoring in other business needs including cost-effectiveness and innovation. Profiles can be used to conduct self-assessments and communicate within an organization or between organizations.

Risk Management and the Cybersecurity Framework:

Risk management is the ongoing process of identifying, assessing, and responding to risk. To manage risk, organizations should understand the likelihood that an event will occur and the resulting impact. With this information, organizations can determine the acceptable level of risk for delivery of services and can express this as their risk tolerance.

With an understanding of risk tolerance, organizations can prioritize cybersecurity activities, enabling organizations to make informed decisions about cybersecurity expenditures. Implementation of risk management programs offers organizations the ability to quantify and communicate adjustments to their cybersecurity programs. Organizations may choose to handle risk in different ways, including mitigating the risk, transferring the risk, avoiding the risk, or accepting the risk, depending on the potential impact to the delivery of critical services.

The Framework uses risk management processes to enable organizations to inform and prioritize decisions regarding cybersecurity. It supports recurring risk assessments and validation of business drivers to help organizations select target states for cybersecurity activities that reflect desired outcomes. Thus, the Framework gives organizations the ability to dynamically select and direct improvement in cybersecurity risk management for the IT and ICS environments."

Your organization plan must be a comprehensive approach identifying the framework for enabling organizations to establish cybersecurity policy in the enterprise. Submit to your assignment folder by the due date assigned in your syllabus schedule.

Reference no: EM13921229

Questions Cloud

Discuss key factors that will influence your recommendation : You work for a compensation consulting firm. Discuss the key factors that will influence your recommendation for each of these three parameters.
What a makes sally indifferent between the two plans : What a makes Sally indifferent between the two plans? As the sales manager, which plan do you select? Give an explanation that shows why this plan is optimal.
Calculate the accrued principal and coupon payment : Suppose you purchase a $1,000 TIPS on January 1, 2013. The bond carries a fixed coupon of 1 percent. Over the first two years, semi annual inflation is 2 percent, 2 percent, 4 percent, and 2 percent, respectively. For each six-month period, calculate..
Assuming target capital structure : Assuming a target capital structure of: 40% debt 20% preferred stock 40% common equity What would be the WACC given the following: all debt will be from the sale of bonds with a coupon of 10% (assume no flotation costs), preferred stock's associated ..
Vulnerability scans and effective risk management protocols : Prepare vulnerability scans and effective risk management protocols to ensure protections remain current and effective and detect any issues.
How many francs would a dollar buy tomorrow : Suppose that the exchange rate is 0.85 dollars per Swiss franc. If the franc appreciated 12% against the dollar, how many francs would a dollar buy tomorrow?
Explain what is meant by computer network : Describe a DBMS and its functions. List, at minimum, three of the popular DBMS products and give a brief description of each. Identify the disadvantages of employee use of mobile systems at work and discuss each of the disadvantages.
Based on semiannual compounding-what is the bonds price : Moerdyk Corporation's bonds have a 10-year maturity, a 6.25% semiannual coupon, and a par value of $1,000. The going interest rate (rd) is 5%, based on semiannual compounding. What is the bond's price?
Which house do you think will be in better condition : Two employees are assigned to work overseas for a two-year period. Which house do you think will be in better condition after the two years? Explain.

Reviews

Write a Review

Business Management Questions & Answers

  Analysis of barilla group

Make a research on the Barilla Group, and choose one Barilla product and describe the components of the product value chain.

  Managers be concerned with informal networks

Why should managers be concerned with informal networks and how can informal networks be utilized in the context of managerial interviewing?

  General public as stakeholder

Some times the public can be a stakeholder and they can number in the thousands (like a nuclear power plant). How does one include so many stakeholders in such a decision?

  Clearly defining a scope

Clearly defining a scope - Why is it important for a project to have a clearly defined scope statement all parties agree with?

  Explaining role of personality in a leader

Do you feel it is beneficial to consider the role of personality or would you rather divide work evenly and set a list of standards and deadlines for everyone to follow?

  An elevator-pitch business model

An Elevator-Pitch Business Model

  Power of government regulating utilization of real property

The power of the government to regulate what use real property may be used for is known as

  Authority and power in business1 why is it important to

authority and power in business1. why is it important to maintain a balance of power between different groups of

  Open systems theory and interconnections

Only way to study a system is to stress the system and observe how the system responds to stress. Organizations are analogous as such systems

  Internal and external stakeholders and decision makinga

internal and external stakeholders and decision makinga hard time answering the following question and coming up with

  Accounts receivable transactions occurred

Accounts Receivable $1500,supplies $500, Office Equipment $5000,Accounts payable $4200,and Angie Crawford, Capital $6800. during August the following transactions occurred

  Why are ad agencies now hiring more employees

Why are ad agencies now hiring more employees with quantitative analysis skills, according to ?1. Because those individuals tend not to succeed in the graphic design of sales promotions.2. To produce graphics that help non-experts understand quantita..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd