Give a description of the risk each vulnerability or threat


Question: Individual: Security Planning and Risk Management

Instructions:

Resource: Security Planning and Risk Management Template. The CIO of the organization you chose is ready for you to take a look at the organization's potential vulnerabilities and threats.

Complete the 2-page Security Planning and Risk Management Template. Include the following:

• Considering the aspects or components of the cyber domain, list potential vulnerabilities or threats facing the organization.

• Give a description of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation.

• Explain each risk's impact on the organization.

• Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Or, give a defined reason why this vulnerability or threat would not be mitigated, such as the use of a different risk control strategy. Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

Individual: Intrusion Detection

Instructions: After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide justification for adding intrusion detection software (IDS), as well. Research various IDS that would benefit the company.

Create a 2-page table for the CIO to share with upper management. Include the following:

• Reasons why IDS would benefit the company and the larger cyber Domain

• Descriptions of the categories and models of intrusion detection and prevention systems

• A description of the function of antivirus software, firewalls, and IDS

• Examples of commercial software that could provide the solution. Include citations as necessary in APA format.

Click the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

Individual: Roles in the Cyber Domain

Instructions: The presentation was a success, and the CIO of the organization you choose, while pleased, has another task for you. Because of the overwhelming support he gained from your presentation, he is assigned with staffing a team to provide the intrusion detection software (IDS) solution. Therefore, you will provide him with the following information to consider in his planning:

Part A: Create 2 page summary including the following:

• The number of additional employees necessary to rollout and support an IDS desktop solution

• An explanation as to how individuals work with the existing desktop support and malware teams

• The job title for those who normally perform rollout and support functions for the IDS desktop solution

• An outline of the daily duties for the additional employees hired for rollout and support functions for the IDS desktop solution

Part B: Create an infographic using an infographic maker, such as Piktochart, Venngage, or Canva, displaying an organization chart showing the following:

• The job titles provided in your summary and how they fit in with the existing cybersecurity team

• A list of the industry certifications the new IDS rollout-and-support function employees should have or can work toward. Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Solution Preview :

Prepared by a verified Expert
Dissertation: Give a description of the risk each vulnerability or threat
Reference No:- TGS02888072

Now Priced at $60 (50% Discount)

Recommended (90%)

Rated (4.3/5)