Cyber security vulnerabilities
Identify an organization (enterprise or small-medium business). Assess the security vulnerabilities of the organization’s computing systems along with the techniques used to protect them. Consider a breadth of technologies such as intrusion prevention systems, access control, policy, data protection, encryption, authentication, software assurance, and other related cybersecurity concepts. Competencies: Identification of the threat landscape and attack vectors. Understanding of how vulnerabilities and risks are identified, prioritized. Application of cybersecurity policy, analysis, detection, and prevention techniques to business drivers in the organization. Description: Write a research paper (about 10-12 double spaced pages) based on your research and analysis of an organization of your choice.
1. It is best to choose an organization for which you have ability to do research “ through interviews, publicly available information, audit reports, personal knowledge, reports and analyses done by other scholars. It is okay to use a generic name for an organization if you need to maintain confidentiality of the organization.
2. Identify the mission of the organization. As a cybersecurity professional you need to think of the business mission. Your primary role is to ensure success of the organization through a risk optimized digital strategy. In this section inform the reader what you feel is relevant for your story.
3. Identify the systems and vulnerabilities of the most critical systems for the organization
4. Enumerate and rank risks and vulnerabilities with respect to attack vectors, campaigns, and potential business impact. These could be related to data at rest, transactional systems, multiple access points, development methodologies, etc.
5. While identifying risks, discuss cybersecurity using Confidentiality, Integrity, and Availability terms. However, tie it to overall business risks, which could be financial, market share, reputation loss, damages, legal fees, and other similar issues. 6. Consider ease of implementation and security management issues associated with the preventative measures. Are there particular skill sets required, is the technology proven and stable, or is it emerging technology?
7. Consider organizational policy, structure, and governance. Does the organization have a published information protection policy? Does the organization follow the policy and preventative measures? When incidents happen who makes decisions? Who declares a disaster? Who informs law enforcement, media? Does the organization have an Incident Response or Disaster Recovery Plan? Is the organization audited and/or conduct table to/walk through exercises?
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A GOOD DISCOUNT