What are the most significant threats to your data

Assignment Help Computer Network Security
Reference no: EM13667323

Read the following scenario and use it as the basis for your answers to the associated essay questions:

Scenario

You are an information system security professional for CCS International, a company that provides IT personnel for a variety of government and private contracts. The organization to which you are currently contracted hires a new chief security officer (CSO) after the previous CSO retires. Although the new CSO is in charge of security for the organization's data assets, networks, and computer systems, her background and most recent experience is in physical security, and she knows very little about information security. Your manager explains that you have been assigned the task of preparing an information brief for the new CSO, which will provide her with the basics of cyber security, acquaints her with the current threats facing your organization's data infrastructure, and the legal issues related to protecting the enterprise. Prepare a slide presentation covering (at a minimum) the following topics:

  • What is cyber security, and what are some of its key concepts?
  • What are the most significant threats to your data, and what are some of the root causes of those threats?
  • Are cyber criminals a real danger to your enterprise? Why or why not?
  • What is risk management, and how can the risk management process help you protect your infrastructure and data?
  • What are some computer security best practices that you would recommend, and how will they help protect your IT assets?
  • If your organization does become a victim of a cyber-crime or a security incident, how will you respond? What types of evidence would be important to your investigation, and how would they be used? What would law enforcement's role be in your incident response plan?
  • Are there any laws at the local, state, federal, or even international level that protect your organization by imposing penalties on cyber criminals? Provide at least one example of a cyber-crime court case, and explain both its outcome and its significance.
  • What do you need from the CSO to best protect your organization? Justify your requests.

Assignment

Prepare a 15- to 20-slide presentation addressing the scenario and covering the topics above. Ensure that you create a title slide for your presentation (not included in the 15- to 20-slide count) displaying your name, the course title, and the date of submission. Be sure to use a background and fonts appropriate for your meeting with the CSO.

Prepare a script to go along with the slide presentation that could be read to provide an in-depth discussion of the topics highlighted on the slides. Research the topics above, using your textbook, information provided in class, and resources provided by the UMUC library or textbooks from previous courses. Your script should be written in an academic format, should be logically organized (e.g., introduction, body, and conclusion), and should include the following:

- a cover page with your name, the course title, and the date of submission

- an introductory section that explains the purpose of the presentation

- the body of the paper, addressing the topics discussed in your slides

- a conclusion section that summarizes your discussions

- a References page in which you reference the text or other sources, which must be properly documented and cited, using APA formatting

The script must be a minimum of 10 double-spaced, computer-generated pages in length, using a 12-point font, with 1-inch page margins (top, bottom, right, and left). There must also be a cover page and a References page; these two pages will not count toward the required page total.

Verified Expert

Reference no: EM13667323

Questions Cloud

Find the power delivered by the person pulling on the rope : A 6.2 kilogram box is being lifted by means of a light rope that is threaded through a single, light, frictionless pulley that is attached to the ceiling. find the power delivered by the person pulling on the rope
Determine the tension in the string at instant of projection : A particle of mass 3 kilogram is attached to the end of a ring of length 4meter, whose other end is fixed. determine the tension in the string at the instant of projection
How does the leadership respond : How does the leadership respond?
Explain what other properties these solutions have in common : Determine two aqueous solutions one of sucrose and the other of nitric acid. Both solutions freeze at -1.5 degree Celsius. Explain what other properties these solutions have in common
What are the most significant threats to your data : What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - are cyber criminals a real danger to your enterprise? Why or why not?
Determine the retarding force acting on the car : A car of mass 1200 kilogram is traveling at 28.0 m/s. Determine the retarding force acting on the car
How political is your organization really : What power structures exist in your organization, and how are they managed? Look at the individuals in positions to do something; how do they act? Those close to the decision-makers, how do they use the power of those they report to? How political is..
Explain what is better for cleaning when a hard water : Explain what is better for cleaning when a hard water is used a soap or a detergent and why
Find how much energy is stored in the capacitor : A 40-pF capacitor is immersed in silicone oil, which has a dielectric constant of 2.6. Find how much energy is stored in the capacitor

Reviews

Write a Review

Computer Network Security Questions & Answers

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  What efforts must be made to help overcome these challenges

What do you believe to be the primary challenges that law enforcement agencies must face in investigating cyber exploitation and cyber crime? What efforts must be made to help overcome these challenges?

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  How to generate the same hash value

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Please type a three- to five-page 800 to 1200 words paper

please type a three- to five-page 800 to 1200 words paper. using apa style assess the importance of developing a

  Udp programs to establish a secure communication channel

Write UDP programs allowing two parties to establish a secure communication channel and perform a security analysis for the key exchange protocol

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

  What is the plain text m

We assume that Oscar is able to observe all messages sent from Alice to Bob and vice versa. Oscar has no knowledge of any keys but the public one in case of DS - Will Bob detect this

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd