Why should businesses invest in cybersecurity

Assignment Help Basic Computer Science
Reference no: EM131368441

Case Study #1: Why should businesses invest in cybersecurity?

Case Scenario:

A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity. The purpose of this white paper is to "fill in the gaps" in a business case that was already prepared by the company's Chief Information Officer. The target audience for your paper is the company's C-suite executives. These executives will be meeting later this month to discuss budget requests from department heads. The company has requested that your white paper use the same investment categories as are already in use for the CIO's business case: people, processes, and technologies.  

Research:

  • Read / Review the Week 1 readings.
  • Find three or more additional sources which provide information about best practice recommendations for cybersecurity and other reasons why businesses should invest in people, processes, and technologies related to cybersecurity. These additional sources can include analyst reports (e.g. Gartner, Forrester, Price-Waterhouse, Booz-Allen) and/or news stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc.

Write:

Write a two to three page summary of your research. At a minimum, your summary must include the following:

An introduction or overview of cybersecurity which provides definitions and addresses the business need for cybersecurity. This introduction should be suitable for an executive audience.

A separate section which addresses ethical considerations which drive the business need for investments in cybersecurity.

A review of best practices and recommendations which can be added to the existing business case to provide justification for cybersecurity-focused investments in the three investment categories identified by the company: people, processes, and technologies.

Your white paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.

Submit For Grading & Discussion

Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)

Formatting Instructions

Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.

Additional Information

You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.

You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.

Reference no: EM131368441

Questions Cloud

Small business from a traditional retail store : One difficulty of moving a small business from a traditional retail store to an online store is channel complications. In many cases, everything has to be reconsidered. For example, how will you communicate with your customers? How will they find ..
Strategic diversity education for management : Determine whether the research plan meetsthe scientific merit criteria. Each performance level is described for each"core" criteria in the rubric - Write a brief statement regarding the need for the study that fully describes the problem or need b..
Describe how the elements fit together : In your own words, describe how the elements fit together. Choose one element from the list below and give a real life example that demonstrates how enterprise data management relates to the element.
What approach firefighters might use to fight this type : Ethanol Fires can be difficult to extinguish. Discuss why this is true and what approach firefighters might use to fight this type of fire.Your total response must be at least 200 words in length. All sources used, including the textbook, must be ..
Why should businesses invest in cybersecurity : A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity.
Write a narration essay on one of the given topic : Write a narration essay on one of the topics from the list provided.- Narration is one of the most common types of professional writing, and it seeks to answer the basic question "What happened?"
Specify one controversial corporate social responsibility : Specify one controversial corporate social responsibility concern associated with Apple or approved organization. Submit a reference page with at least four quality references that you have used for this presentation / paper.
Description of the disease or disorder - eye diseases : HLTEN515B Implement and monitor nursing care for older clients. Candidates need to research one disease/disorder, from each of the following areas, in relation to the older person - Eye diseases, Oral cavity diseases and Skin diseases
Discuss about the post given below : Our body makes energy from the carbohydrate and lipid present in the food we eat and drink. Glucose is our body's preferred energy source but fatty acids provide an alternative energy source when needed. This forum will explore deeper several to..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Very important component of your system

The user interface is a very important component of your system. In this assignment you are first asked to read and understand a popular set of usability heuristics. Readings (Jakob Nielsen is a very renowned usability expert):

  How to use the input validation

Requirement Determine if a word is a palindrome Using a cloulread in a word chaster by character Store each character in its own node.

  Present opportunities for a workforce leader

What is diversity? What graphic model, drawing, picture, google link, verse or ‘famous quotation,' etc. captures your definition of diversity? Does "diversity" present opportunities for a workforce leader?

  What are the barycentric coordinates and ray parameter

What are the barycentric coordinates and ray parameter where the ray (1, 1, 1) + t(-1, -1, -1) hits the triangle with vertices (1, 0, 0), (0, 1, 0), and (0, 0, 1)? Note: this is a good debugging case.

  Would nvp work if you use n identical software copies

NVP has not been as widely used as hardware duplications for highly dependable or critical systems. Why?

  Why is it important to pretest a problem for generalization

Why is it important to pretest a problem for generalization

  Explain the productivity levels of two management approach

Analyze the productivity levels of the 2 management approaches, and decide which is superior. Include the SPSS output, which validates your conclusion.

  Identify five common project risk strategies employed

Your task for this part of the assessment item is to answer the following two questions. Each question will carry equal (20 marks) and your answer for each question should be around 1000 words:

  Creating a payoff table for decision

Amy decided to select the best option which will minimize her total 36-month cost. Difficult is that Amy is not sure how many miles she will drive over next three years. Create payoff table for Amy's decision.

  Your first program will require the use of static methods

Your first program will require the use of static methods and for loops

  Search the web for steganographic tools

In a side-by-side comparison of the two images, can you tell the difference between the original image and the image with the embedded file?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd