Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Background The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks

Background

  • The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks to an organization's computing environment.
  • Approach the project as if you are recommending a cybersecurity solution to an organization in one of the following verticals: defense, e-commerce, education, energy, financial, healthcare, manufacturing, retail, travel and tourism, transportation, etc.

Implementation Plan

  • Include problem statement and recommended solution slides from previous deliverable for reference.
  • Explain the risks that BYOD paused to the organization's critical computing resources and ways to mitigate that risk in a cost-effective manner.
  • Demonstrate how the use of encryption can be used to enhance authenticity, confidentiality, integrity, and non-repudiation in the organization.
  • Given a combination of malware attack on key systems coupled with BYOD and endpoint security, develop a plan to effectively implement your proposed solution.
  • The plan should include the implementation flow diagram (order of major tasks), required resources, and high-level procedures.
  • Formulate a cost-benefit analysis (CBA) using existing conceptual frameworks. See Appendix A for more information.
  • Describe how the solution will be validated before deployment.
  • Describe how the solution will be evaluated and continuously improved in operation.
  • Describe how the solution, data and software, will be decommissioned once it reaches end of life.
  • Discuss any legal, ethical, and cultural considerations associated with the solution.

A template file is provided below for your deliverable.

Implementation Plan

Criteria

Include problem statement from previous deliverable

Include recommended solution from previous deliverable

Implementation flow diagram (Malware, BYOD, Encryption)

Cost-Benefit Analysis (CBA)

Solution validation

Solution evaluation and continuous improvement

Decommission

Legal, ethical, and cultural considerations

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management in Practice

Authors: Samuel J. Mantel Jr., Jack R. Meredith, Sco

4th edition

470533013, 978-0470533017

More Books

Students also viewed these General Management questions