Create a cybersecurity standards


Assignment:

Description

Select a company or organization to be the focus of your Management Plan. The company or organization may be real or fictitious, but you should have enough information about the organization to execute the tasks required in each Individual Project (IP).

Create a shell document for the Management Plan. As you continue through the course, you will add material to each section and complete a final draft. Future sections will be completed on the weeks they are assigned. All section headings should be included; however, the  content in some sections will remain blank until that specific week's assignment is due.

The Management Plan that you are responsible for will consist of the following five sections:

1. Cybersecurity Standards

2. Security Policies and Monitoring

3. Incident Response Requirements and Analysis

4. Incident Response Plan

5. Cybersecurity Budgeting Priorities

The Management Plan shell should be framed as follows:

• Use MS Word

• Title Page

o Course number and name
o Project name
o Your name
o Date

• Table of Contents (TOC)

o Use an autogenerated TOC.
o This should be on a separate page.
o This should be a maximum of 3 levels deep.
o Be sure to update the fields of the TOC so that it is up to date before submitting your project.

• Section Headings (Create each heading on a new page with "TBD" as content, except for sections listed under "New Content" below.)

o Cybersecurity Standards
o Security Policies and Monitoring
o Incident Response Requirements and Analysis
o Incident Response Plan
o Cybersecurity Budgeting Priorities

• New Content for IP1 requires that you describe the following in 2 to 3 pages:

o A description of your company or organization, including the following:

  • Name of the company or organization
  • Size of the company or organization
  • Location of the company or organization
  • Description of the company or organization's mission or business objectives

o At least 2 cybersecurity standards that your organization must adhere to

Be sure to outline the specific requirements and explain how they are relevant to your company or organization.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

• Antonucci

• National Institute of Standards and Technology. (2010). Guide for applying the risk management framework to federal information systems: A security life cycle approach.

• National Institute of Standards and Technology. (2017). Risk management framework for information systems and organizations: A system life cycle approach for security and privacy (Discussion draft).

Solution Preview :

Prepared by a verified Expert
Business Law and Ethics: Create a cybersecurity standards
Reference No:- TGS03022778

Now Priced at $40 (50% Discount)

Recommended (96%)

Rated (4.8/5)