Security Planning and Risk Management| Computer Science

Security Planning and Risk Management| Computer Science

Instructions:

Resource: Security Planning and Risk Management Template

The CIO of the organization you chose is ready for you to take a look at

the organization’s potential vulnerabilities and threats.

Complete the 2-page Security Planning and Risk Management

Template. Include the following:

• Considering the aspects or components of the cyber domain, list

potential vulnerabilities or threats facing the organization.

• Give a description of the risk each vulnerability or threat would have

on the organization in terms of its people, network, data, or reputation.

• Explain each risk’s impact on the organization.

• Provide a defined mitigation for each vulnerability, such as an

incident response plan, disaster recovery plan, or business continuity

plan. Or, give a defined reason why this vulnerability or threat would not

be mitigated, such as the use of a different risk control strategy.

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

CYB 100 Week 4 Intrusion Detection

Individual: Intrusion Detection

Instructions:

After reviewing your latest submission, the CIO has found some areas

of concern and would like you to provide a little clarity on one subject.

He is meeting with upper management to persuade them to purchase a

new suite of intrusion detection software for the network. Currently, the

organization has antivirus software and uses firewalls. Provide

justification for adding intrusion detection software (IDS), as well.

Research various IDS that would benefit the company.

Create a 2-page table for the CIO to share with upper management.

Include the following:

• Reasons why IDS would benefit the company and the larger cyber

Domain

• Descriptions of the categories and models of intrusion detection and

prevention systems

• A description of the function of antivirus software, firewalls, and IDS

• Examples of commercial software that could provide the solution

Include citations as necessary in APA format.

Click the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

CYB 100 Week 5 Roles in the Cyber Domain

Individual: Roles in the Cyber Domain

Instructions:

The presentation was a success, and the CIO of the organization you

choose, while pleased, has another task for you. Because of the

overwhelming support he gained from your presentation, he is assigned

with staffing a team to provide the intrusion detection software (IDS)

solution. Therefore, you will provide him with the following information

to consider in his planning:

Part A:

Create 2 page summary including the following:

• The number of additional employees necessary to rollout and

support an IDS desktop solution

• An explanation as to how individuals work with the existing desktop

support and malware teams

• The job title for those who normally perform rollout and support

functions for the IDS desktop solution

• An outline of the daily duties for the additional employees hired for

rollout and support functions for the IDS desktop solution

Part B:

Create an infographic using an infographic maker, such as Piktochart,

Venngage, or Canva, displaying an organization chart showing the

following:

• The job titles provided in your summary and how they fit in with the

existing cybersecurity team

• A list of the industry certifications the new IDS rollout-and-support function

employees should have or can work toward

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Order from us and get better grades. We are the service you have been looking for.