Get personal help with your studies from any of the 45,000 experienced experts on Studybay

  • No intermediaries
  • No plagiarism
  • Any Subject
  • Always on time

Here’s an example of project completed by our experts:

Week # 3 Assignment (Example)

Document Preview:

Assignment Author’s Name Institutional Affiliation Cybersecurity Introduction and overview Every organization has an objective. In this digitital era business organization uses automated information technology (IT) systems to generate and process their information for the best support of their objectives vision and mission. Risk managemnt plays an important role in protecting an institution’s data assets and its objectives from information technology risk (Samuel  2014). The most efficient risk management process is an important element of a successful IT security program. The aim of an organiuzation’s risk management process is to protect an institutions and its ability to carry out their mission and not just its IT assets. Therefore the risk management process must be treated mainly as a technical function which is performed by an IT expert who not only manages the operation of the IT system bu also manages the functions of an organization. Purpose and objectives Risks are Microsoft and Facebook has made it easier for online users to secure their accounts and financial services companies like MasterCard PayPal and Visa (Smith  2015). How will the organization make a profit? Good security is associated with good visibility across the business. Improving the visibility level across the business assets from the security viewpoint and the compliance enables an organization to reduce its expenses by streaming its fundamental security management practice in vulnerable management. Reductions in business insurance premiums enable the PwC to minimize its costs thus increasing revenues. References Antonucci  D. & Alwarith  B. (2017). Internal Organization Context. The Cyber Risk Handbook 207-241. doi:10.1002/9781119309741.ch15 Cybersecurity and Corporate Governance. (2017). Cybersecurity Law 133-157. doi:10.1002/9781119231899.ch4 Samuel  C. (2014). India's Cybersecurity - The Landscape. Chinese Cybersecurity and Cyberdefense 101-127. doi:10.1002/9781119009009.ch4 Smith  P. T. (2015). Cyberattacks as Casus Belli: A Sovereignty-Based Account. Journal of Applied Philosophy n/a-n/a. doi:10.1111/japp.12169 Sinister trends in cyberthreats. (2011). Network Security  2011(2) 2. doi:10.1016/s1353-4858(11)70010-1 [...]

Order Description:

Welcome to Week # 3. This week's assignment will help you to fulfill the requirements for the third course objective (CO-3: Prepare a plan to manage functions that encompass overseeing a program or technical aspect of a security program at a high level ensuring currency with changing risk and threat environments). For this week's assignment instructions, please see below: Assignment Instructions: You are tasked as the Chief Information Security Officer for a large Fortune 500 International Firm to plan, develop and manage the functions that oversee a new large scale Cybersecurity program. The large scale Cybersecurity program will be a “Digital Blackwater” type organization (see the description below of “Private or Mercenary Armies” from the textbook). For the purpose of this assignment, you are to search the Internet and utilize course reading materials to research the types of functions, strategies and tactics this organization will use for this new program. Use your imagination and name your proposed organization and follow the requirements below: REQUIREMENTS: 4 – 6 Pages in length in APA format (not including a cover page and reference section) Cover Page Introduction - Firm name and overview of its purpose Technical organizational proposal: Value proposition for the new organization Functions of the organization including management How the organization will address dynamic Cyber risk and threat environments Strategies and tactics the organization will employ Proposed benefits for the U.S. government How will the organization make a profit Reference Section MISCELLANEOUS: Use current and real world data to make your points, not just the textbook Your references should not be more than 5 years old Private or Mercenary Armies In an age where cyber warfare is more common than the physical battlefield, it may be necessary for the private sector to stop playing defense and go on offense, Gen. Michael Hayden said on August 1, 2011. Hayden, who led the National Security Administration and Central Intelligence Agency under president George W. Bush, said during a panel discussion at the Aspen Security Forum in Aspen, Colo. that the federal government may not be the sole defender of private sector companies—and that there is precedent for such action. "We may come to a point where defense is more actively and aggressively defined even for the private sector and what is permitted there is something that we would never let the private sector do in physical space," he said. "Let me really throw out a bumper sticker for you: how about a digital Blackwater?" he asked. "I mean, we have privatized certain defense activities, even in physical space, and now you have got a new domain in which we do not have any paths trampled down in the forest in terms of what it is we expect the government—or will allow the government—to do". Blackwater is a private military contractor that has changed its name to Academi after incidents in Iraq gave them a negative image. If companies decide to hire forces (hackers) to strike back or conduct recovery operations it could change the cyberspace battlefield dramatically (Winterfield and Andress, 2013).

Subject Area: Information Technology

Document Type: Reports

This project has already been completed by one of the Studybay experts. The client rated this project:

Project's rating is 5/5

Price $30

Words 1100

Pages 4

Completed in 6 days

Expert technologies1

Client Review

I got an A on my paper. Work was done correctly and promptly. Would most definitely use this writer again!!!

Positive
10.01.2017

Similar projects

Subject of the project is Information Technology   Type of the project is Reports

Evaluation Essay

Need Help With a Project on This or Another Topic?

Cooperate with seasoned experts directly — create your project now and start getting help in 2 minutes.

Studybay top experts

Reviews from Studybay Community

  • Our Studybay rating is:
    4.9
  • Our ReviewCentre rating is:
    4.8
  • Our SiteJabber rating is:
    4.5