Reference no: EM131353119
Assignment: Cybersecurity in Business and Industry
Case Study: Why should businesses invest in cybersecurity?
Case Scenario:
A client company has asked your cybersecurity consulting firm to provide it with a 2 to 3 page white paper which discusses the business need for investments in cybersecurity.The purpose of this white paper is to "fill in the gaps" in a business case that was already prepared by the company's Chief Information Officer.The target audience for your paper is the company's C-suite executives. These executives will be meeting later this month to discuss budget requests from department heads. The company has requested that your white paper use the sameinvestment categories as are already in use for the CIO's business case: people, processes, and technologies.
Research:
1. Read / Review the Week 1 readings.
2. Find three or more additional sources which provide information about best practice recommendations for cybersecurity and other reasons why businesses should invest in people, processes, and technologies related to cybersecurity. These additional sources can include analyst reports (e.g. Gartner, Forrester, Price-Waterhouse, Booz-Allen) and/ornews stories about recent attacks / threats, data breaches, cybercrime, cyber terrorism, etc.
Write:
Write a two to three page summary of your research. At a minimum, your summary must include the following:
1. An introduction or overview of cybersecurity which provides definitions and addresses the business need for cybersecurity. This introduction should be suitable for an executive audience.
2. A separate section which addresses ethical considerations which drive the business need for investments in cybersecurity.
3. A review of best practices and recommendations which can be added to the existingbusiness case to provide justification forcybersecurity-focused investments in the three investment categories identified by the company: people, processes, and technologies.
Your white paper should use standard terms and definitions for cybersecurity.See Course Content > Cybersecurity Concepts Review for recommended resources.
Submit For Grading & Discussion
1. Submit your case study in MS Word format (.docx or .doc file) using the Case Study #1 Assignment in your assignment folder. (Attach the file.)
Formatting Instructions
1. Use standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.
Additional Information
1. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. These items are graded under Professionalism and constitute 20% of the assignment grade.
2. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university's Academic Integrity policy.
Secret desire is to write best-selling novel
: Although K is currently a systems analyst for 3L Corporation, her secret desire is to write a best-selling novel. To this end, she purchased a computer for $3,000 this year. She used the computer only for writing her novel. Can she deduct the entire ..
|
What is measured in assessing health
: Write a paper that addresses the following:What is measured in assessing health?Describe the two assessments you chose. What data was collected in the needs assessments?Identify and discuss the theory(ies) that influenced these needs assessments.
|
How are they helped or hurt by assigning blame
: In one or two paragraphs of your own words, discuss what the novel is saying about blame. Who does each of the three narrators blame for the tragedy? How are they helped or hurt by assigning blame
|
Discussion-one species at a time
: Discussion: One Species At A Time Purpose: The discussion forum will introduce you to the great variety of organisms on earth.
|
Write overview of cybersecurity which address business need
: CSIA 350 6381- An introduction or overview of cybersecurity which provides definitions and addresses the business need for cybersecurity. This introduction should be suitable for an executive audience.
|
Advise to study anatomy and physiology
: How do you advise to study anatomy and physiology?
|
How does an investigator prepare for an interview
: How does an investigator prepare for an interview or interrogation? Are there differences?Find a state supreme court or state appeals case from your state in which a conviction of a defendant from a lower court was overturned due to improper police..
|
Compare and contrast billy ansel and mitchell stephens
: In one or two paragraphs of your own words, compare and contrast Billy Ansel and Mitchell Stephens. Why did the author set these two characters' sections side by side
|
Land used in the taxpayer farming business
: Indicate whether a taxpayer could claim deductions for depreciation or amortization of the following property: Land used in the taxpayer’s farming business. A duplex- the taxpayer lives in one-half while he rents the other half one. The portion of th..
|