Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Background The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks
Background
- The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks to an organization's computing environment.
- Approach the project as if you are recommending a cybersecurity solution to an organization in one of the following verticals: defense, e-commerce, education, energy, financial, healthcare, manufacturing, retail, travel and tourism, transportation, etc.
Implementation Plan
- Include problem statement and recommended solution slides from previous deliverable for reference.
- Explain the risks that BYOD paused to the organization's critical computing resources and ways to mitigate that risk in a cost-effective manner.
- Demonstrate how the use of encryption can be used to enhance authenticity, confidentiality, integrity, and non-repudiation in the organization.
- Given a combination of malware attack on key systems coupled with BYOD and endpoint security, develop a plan to effectively implement your proposed solution.
- The plan should include the implementation flow diagram (order of major tasks), required resources, and high-level procedures.
- Formulate a cost-benefit analysis (CBA) using existing conceptual frameworks. See Appendix A for more information.
- Describe how the solution will be validated before deployment.
- Describe how the solution will be evaluated and continuously improved in operation.
- Describe how the solution, data and software, will be decommissioned once it reaches end of life.
- Discuss any legal, ethical, and cultural considerations associated with the solution.
A template file is provided below for your deliverable.
Implementation Plan
Criteria | |
Include problem statement from previous deliverable | |
Include recommended solution from previous deliverable | |
Implementation flow diagram (Malware, BYOD, Encryption) | |
Cost-Benefit Analysis (CBA) | |
Solution validation | |
Solution evaluation and continuous improvement | |
Decommission | |
Legal, ethical, and cultural considerations |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started