Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

This assignment focuses on applying an information security management model or standard to mitigate a cybersecurity threat or attack type for a fictitious organization. (

This assignment focuses on applying an information security management model or standard to mitigate a cybersecurity threat or attack type for a fictitious organization.
(1) Select one cybersecurity threat or attack - for example, ransomware, insider threat.
(2) Pick one information security management model or standard that will be useful to mitigate the cybersecurity threat/attack chosen in step 1.(See Chapter 8).
(3) Apply the selected information security management model or standard in the context of a fictitious organization. You may choose the organization context and type depending upon your interest or familiarity (Example: Medium-sized healthcare organization, large-sized financial entity, small defense contractor).
(4) Overall, you are expected to present a plan to mitigate the selected cybersecurity threat or attack type for the chosen fictitious organization by applying the security model or standard.
Deliverables:
(10 points) Recorded presentation (along with slide deck) on the selected security model or standard. (30-45 minutes; 30-60 slides)
(10 points) Recorded presentation (along with slide deck) on the plan to mitigate the selected cybersecurity threat or attack type for the chosen fictitious organization.
Peer Reviews
This assignment involves peer reviews for the submissions. Here are some best practices for peer review:
Be respectful and constructive: Offer suggestions, not commands.
Dont focus your comments exclusively on the weaker parts of your peers work: Identify both the good and less-than-good components of your peers work and offer concrete solutions for improving the less-than-good parts.
Be judicious in the amount of feedback youre offering to your peers: Focus on the most essential things or the components of your peers work that you think could make the most improvements most efficiently
Be clear: Aim for clarity and precision in your feedback. Quickly asserting that something is too vague itself is too vague. What specifically is hard to understand? Share with your peers the different ways you could construe what your peer is trying to present.
Ask questions: Feedback doesnt always have to be so assertive. If something isnt clear, ask the creator for more elaboration or context.
Your peer put a lot of time and energy into creating the work that youre reviewing: You should aim to respect that time and energy by committing the same time and energy providing thoughtful feedback.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL/PHP Database Applications

Authors: Jay Greenspan, Brad Bulger

1st Edition

978-0764535376

More Books

Students explore these related Databases questions