Order Number |
636738393092 |
Type of Project |
ESSAY |
Writer Level |
PHD VERIFIED |
Format |
APA |
Academic Sources |
10 |
Page Count |
3-12 PAGES |
IT484 Cyber Security Policies Term Paper
IT484, Cyber, Security, Policies, Term, Paper
Part 1: Using the Internet and/or the Library
Research and explain your answer to the following: Evaluate the NIST SP 800-37 Risk Management Framework.
SOME THOUGHTS: There is a Revision 2 … how does revision 2 differ from revise 1 … cyber deterrence … explain deterrence … all about risk management framework (RMF)… it addresses 7 major objectives.
Looks at risk management capabilities at all levels of an organization [explain “all levels”] … created to assist IT organizations of the US government with better management techniques. [Risk is about Continuous Monitoring really … Warning signs…keeping cyber threats away …Honeypots …proactive measures … preventing cyber-attacks … Firewalls … preventing risks … repelling risk. Replace these words with 500 to 1,000 words.
Then remove italics and change the color to black. Replace these words with 500 to 1,000 words. Then remove italics and change the color to black.
Part 2: Research and Explain the Following
1) Discuss the different categories of security controls and give examples.
SOME THOUGHTS: One example is to achieve CIA … Administrative, Technical/Logical and Physical domains. Replace these words with 200 words. I believe that CHAPTER 5 OF YOUR COURSE CAN PROVIDE SOME GUIDANCE. Then remove italics and change the color to black. Continue replacing these words with 200 words. Then remove italics and change the color to black. Replace these words with 200 words. Then remove italics and change the color to black (Murphy, 2015, p. xy).
2) Give an everyday example of risk analysis that you do every day. For example, should you wear a seatbelt when driving a block or two?
Replace these words with 200 words. Then remove italics and change the color to black. Continue replacing these words with 200 words. Then remove italics and change the color to black. Replace these words with 200 words. Then remove italics and change the color to black (Murphy, 2015, p. xy).
3) Discuss how to design cybersecurity policies that support risk assessment.
SOME THOUGHTS: Consider how to include the ability to create/support risk assessment and analysis in all operations. Policies work to address the most frequent of risks and highest probability … e.g. insider risk (disgruntled employees) … email hoaxes … Replace these words with 200 words.
Then remove italics and change the color to black. Continue replacing these words with 200 words. Then remove italics and change the color to black. Replace these words with 200 words. Then remove italics and change the color to black (Murphy, 2015, p. xy).
References
Murphy, B. (2015). SSCP (ISC)2 Systems security certified practitioner official study guide, (1st, Ed.). [VitalSource Bookshelf Online]. Retrieved from https://purdueuniversityglobal. vitalsource.com/#/books/9781119059684/cfi/0!/4/2@100:0.00
NOTE : DELETE this line and ALL underlined text before submitting your Assignment.
Assignment 5 Grading Rubric = 45 points
Assignment Requirements | Points
Possible |
Points
Earned |
Part 1 | ||
Evaluate the NIST SP 800-37 Risk Management Framework. (500-1000 words) | 0–30 | |
Part 2 | ||
Discuss the different categories of security controls and give examples. (200 or more words) | 0–5 | |
Give an everyday example of risk analysis that you do every day. For example, should you wear a seatbelt when driving a block or two? (200 or more words) | 0–5 | |
Discuss how to design cybersecurity policies that support risk assessment. (200 or more words) | 0–5 | |
Column Total | 0–45 | |
Less deduction taken for spelling, grammar, and APA errors. Plagiarism is totally unacceptable. | ||
New total after deductions |
Professional Plagiarism Free Paper in APA/MLA/Harvard/Turabian Format, Instant Delivery, High Quality Submissions, 100% Unique, Turnitin Report Attached