Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please upload your complete cybersecurity program here. Again, you may use any template you find online and modify it to fit your particular business' requirements.
Please upload your complete cybersecurity program here. Again, you may use any template you find online and modify it to fit your particular business' requirements. Always cite as needed.
Some notes:
You were hired as the subject matter expert so your document should reflect professionalism. Please use a cover letter, page numbers, versioning control, same font, same font size, same bullet point indentation, and watch out for orphan lines and headers. Do not use you, we or other pronouns.
If you are using a template, please make sure that the questions the template asks for example: do you have any important data are answered by you, and not left for the business owner to answer when they are reviewing this document. You were "hired" to provide your expertise not to provide vague advice that the business owner could have found on the first page of a Google search. Ensure that your advice is realistic and within budget, ie "install cameras in x and y location" is realistic, but "install a biometric scanner at every entrance" is not.
This project is meant to be a culmination of the semester. That means that it is not an assignment that you can do in hours the day it is due! If your assignment looks like it was completed in hours, do not expect a grade higher than
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeGoals and Objectives
pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomePhysical Security
Realistic and within budget
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomePersonnel Security & Roles
Includes Computer Roles
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeTraining Plan
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeSystem & Data Identification
Identify the type of data and the protection it needs.
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeVulnerabilities
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeSystem Security Plans
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeConfiguration & Patch Management
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeNetwork & Website Security
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeSystem Documentation
To include any policies that need to be written no need to write the policy, if you just state that a termination policy is needed that is sufficient. But you have to outline all missing policies within this section
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeIncident Response & Disaster Recovery Program
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeThreat Assessment
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeCertification & Accreditation
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeOnGoing Program Monitoring Plan
to pts
Full Marks
pts
No Marks
pts
This criterion is linked to a Learning OutcomeProfessionalism
Do not have orphan headers, large areas of white space, different fonts, different size bullet points, etc.
to pts
Full Marks
pts
No Marks
pts
Total Points:
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started