Security Planning and Risk Management| Computer Science
Instructions:
Resource: Security Planning and Risk Management Template
The CIO of the organization you chose is ready for you to take a look at
the organization’s potential vulnerabilities and threats.
Complete the 2-page Security Planning and Risk Management
Template. Include the following:
• Considering the aspects or components of the cyber domain, list
potential vulnerabilities or threats facing the organization.
• Give a description of the risk each vulnerability or threat would have
on the organization in terms of its people, network, data, or reputation.
• Explain each risk’s impact on the organization.
• Provide a defined mitigation for each vulnerability, such as an
incident response plan, disaster recovery plan, or business continuity
plan. Or, give a defined reason why this vulnerability or threat would not
be mitigated, such as the use of a different risk control strategy.
Include citations as necessary in APA format.
Select the Assignment Files tab to submit your assignment.
Supporting Material: Assignment Grading Guide
CYB 100 Week 4 Intrusion Detection
Individual: Intrusion Detection
Instructions:
After reviewing your latest submission, the CIO has found some areas
of concern and would like you to provide a little clarity on one subject.
He is meeting with upper management to persuade them to purchase a
new suite of intrusion detection software for the network. Currently, the
organization has antivirus software and uses firewalls. Provide
justification for adding intrusion detection software (IDS), as well.
Research various IDS that would benefit the company.
Create a 2-page table for the CIO to share with upper management.
Include the following:
• Reasons why IDS would benefit the company and the larger cyber
Domain
• Descriptions of the categories and models of intrusion detection and
prevention systems
• A description of the function of antivirus software, firewalls, and IDS
• Examples of commercial software that could provide the solution
Include citations as necessary in APA format.
Click the Assignment Files tab to submit your assignment.
Supporting Material: Assignment Grading Guide
CYB 100 Week 5 Roles in the Cyber Domain
Individual: Roles in the Cyber Domain
Instructions:
The presentation was a success, and the CIO of the organization you
choose, while pleased, has another task for you. Because of the
overwhelming support he gained from your presentation, he is assigned
with staffing a team to provide the intrusion detection software (IDS)
solution. Therefore, you will provide him with the following information
to consider in his planning:
Part A:
Create 2 page summary including the following:
• The number of additional employees necessary to rollout and
support an IDS desktop solution
• An explanation as to how individuals work with the existing desktop
support and malware teams
• The job title for those who normally perform rollout and support
functions for the IDS desktop solution
• An outline of the daily duties for the additional employees hired for
rollout and support functions for the IDS desktop solution
Part B:
Create an infographic using an infographic maker, such as Piktochart,
Venngage, or Canva, displaying an organization chart showing the
following:
• The job titles provided in your summary and how they fit in with the
existing cybersecurity team
• A list of the industry certifications the new IDS rollout-and-support function
employees should have or can work toward
Include citations as necessary in APA format.
Select the Assignment Files tab to submit your assignment.