Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Identify the scopes of the project that I have given below The paper I have given this is our project initiation stage. Now we need
Identify the scopes of the project that I have given below
The paper I have given this is our project initiation stage. Now we need to define all possible scopes. The answer should have reference from google scholar
Running head: Cyber Attack Prevention Tool Week #2 Project Deliverable Zeus - A Cyber Attack Prevention Tool Harshit Varma, Mostafizur Rahman, S M Zobayed, Supriya Sharma, Luis Rodriguez Westcliff University, Irvine - CACyber Attack Prevention Tool 10 the effective utilization of the tool, interpretation of threat intelligence, and response to cyber incidents include tutorials on the internet, training videos, and interactive seminars. Implementation plan: The deliverable is a deployment plan for the anti-cyber-attack tool in the target framework or organization. The plan should include the required steps and timelines. The plan must encompass the infrastructure needs, integration with current systems, user training, and change management strategies. Cyber Attack Prevention Tool 11 Risk Assessment There may be several risks associated to a project. Some of them initially identified as below. 1. Patent Infringement Claims 2. Delay in patent paperwork arrival/filing 3. Unavailability of infrastructure 4. In availability of obstructed flow of finances 5. In availability of surplus skilled professionals All the risk will be logged and created into a risk register as the identifiers increase and then shall be logged to ensure compliance with current practices.Cyber Attack Prevention Tool 2 Executive Summary The Cyber-attack prevention tool is a computer program arrangement, planned to secure organizations against cyber assaults, expunge online vulnerabilities which are an increasing threat in today's modern world. Currently, there are over 30,000 cyber breach records ([1] David MacCandless & Tom Evans, 2022) that has shown how vulnerable a software can be and how it can be accesses by a transgressor or a misdemeanant organization. There have been enormous monetary losses as well as bankruptcies from technology companies to local authorities to retail giants. For example, Facebook data breach in 2019 leaked account user information and sums up to a whooping 419 million users ([2] Fast company, 2019) and Shanghai Police exposing citizens tax data ([3] Rebecca Arcesati & Antonia Hamida, 2022). The intended tool employs a combination of progressed risk locations and anticipated strategies to protect against an assortment of cyber dangers including but not limited to, malware, phishing, ransomware, and more. Zeus i will focus on eradicating/mitigatin g web vulnerabilities, creating stronger rewall systems, monitors potential network breaches, reduce downtimes in case of a network breach if any and will entice users and plans to recover the building cost by allowing users to purchase their training online as well as offering yearly plans for purchase including individual as well as corporate plans. Cyber Attack Prevention Tool 3 FINANCE Financial Appraisal The expected cost of building a new tool is estimated to be $500,000 USD, after creating and deploying the software, annual maintenance cost would be roughly 10% of the project cost. Sensitivity Analysis The current need has exceeded far more than just a rewall and antivirus for big corporations. The current availability of software's offer a wide spectrum of features and varies based on the price points ranging from $8 per month to $10,000 per year. There have been recent scenarios where the demand for ransomware has increased by 26% and the market capitalization for cyberattack prevention tools have increased to a staggering sum of $2 Trillion US Dollars ([4] Bharath Aiyer et a1, 2022). Cyber Attack Prevention Tool 4 Project Denition Background Information In today's world as people come together on a virtual network/platform there is always a risk of data being stolen and potentially be used for diabolical purposes. Hence, to protect cyber attack, US government has created a complementary service called Cyber-Security & Infrastructure Security Agency (CISA) to report the attack and to perform investigation based on the breach data provided by the victims. But there is a commercial industry which focuses on mitigate or expunging the threats to minimize the attacks in the rst place and Zeus will follow the same principle as some of the other tool readily available in current market. For example, SolarWinds, Secpod, Mimecast, Norton, BitDefender, etc. Why create Zeus, where there are other tools available in the market? The need for preventative action tool exceed the current supply and other companies' infrastructural limitations to support the demand. In other words, demand will outweigh the supply in forth coming years. Business Objective The primary intent is to create an online presence where the users/clients/ customers can purchase the tool and the software will be offered into different categories to cater wide range of customers. For example, (1) Limit functionality of the full version for client who does not require all the functionality being a small business, or it's a preference, (2) Moderate Protection, for medium sized business, (3) Full version that has plethora of benets that would outweigh risks, maximizing coverage, provide system lockdown in case of breaches, etc. Benets and Limitations 0 Improved Security by automation Cyber Attack Prevention Tool 0 Increase revenue by channelizing efforts and build a software with utmost efciency and skill. 0 Building a strong presence in the market and create a userfriendly (UIMX) experience. 0 Cost savings - Scalability 0 Providing management services and create centralized reporting. 0 To avoid false positive scenarios 0 Reduce complexity for ease of use 0 Limit user error vulnerabilities Cyber Attack Prevention Tool 6 Milestones Schedule R&D 3 months Design and Development 1 year Testing & QA 3 months Deployment & Integration 3 months Training & Support 3 months Detailed milestones with a work breakdown structure is yet to be determined. Cyber Attack Prevention Tool 7 Detailed Objectives It is imperative to establish unambiguous project objectives and deliverables during the initial phases of a project aimed at developing a solution to safeguard against cyber-attacks. In project management, deliverables refer to the tangible outcomes or results that are going to be generated during the project's lifecycle. Conversely, project objectives are the expected results or objectives that the project aims to achieve. Objective: The project aims to establish the following objectives for the development of an anti-cyber attack tool. Enhancing cyber security: The main goal is to create a tool that can accurately identify and address cyber threats, ultimately enhancing the overall cyber security of the system or organization. The software must possess the capability to identify and react to multiple types of security breaches, such as phishing, malware, ransom ware, as well as Distributed Denial-ofService (DDoS) attacks. Improving threat intelligence: An additional objective could be to develop an instrument equipped with advanced threat intelligence functionalities. The process involves the gathering, examination, and explanation of data related to emerging cyber threats, weaknesses, and methods of attack. The tool enables users to stay informed about the latest threats and implement preemptive measures to safeguard their systems. Streamlining incident response: One potential objective could be to create a tool that streamlines incident response and recovery processes for increased efciency. The process entails the automation of identifying an Cyber Attack Prevention Tool 8 incident, analysis, and resolution. The software must be capable of delivering instantaneous notications, extensive data analysis, and effortless incorporation with incident management platforms. This will enable enterprises to promptly react to cyber threats and minimize their consequences . Cyber Attack Prevention Tool 9 Project Deliverables The deliverables for the project aimed at developing an anti-cyberattack tool may comprise of: Functional anti-cyber-attack tool: The main deliverable is to create and implement a software tool that is tailored to mitigate cyber threats. The tool is expected to possess an interface that is easy to understand and use, strong security attributes, and the ability to execute tasks such as identifying potential risks, scanning for vulnerabilities, and managing incidents. Comprehensive documentation: The creation of documentation that outlines the tool's anctionalities, characteristics, and instructions for use is of utmost importance. The documentation must comprise manuals for users, installation guides, system prerequisites, and technical specications. Clear and concise documentation is crucial for users to effectively utilize an instrument and understand its capabilities. Testing and validation reports: The project must incorporate thorough evaluation and verication reports as a component ofits deliverables. The reports are expected to provide a comprehensive account of the testing techniques, test cases, and results from the anti-cyber-attack instrument's various tests. The process guarantees that the tool satises the criteria for effectiveness, dependability, and efcacy in identifying and reducing cyber threats. Training materials: The initiative must comprise of training materials that can aid in the effective adoption and utilization of the anticyber-attack tool. The materials that can be utilized to educate users onStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started