Discuss cybersecurity strategies and the various frameworks. Discuss the threats of modern technology in the workplace.
September 8, 2018
What is it about this product that appeals to me? Who are the people like me that are buying this product? (e.g. demographics, consumer characteristics, buyer behavior)
September 8, 2018

Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.

Project Deliverable 3: Security Policy Documentation

Project Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Research the Internet for a large organization, reviewing its cybersecurity policy.

From your textbook, examine the phrase “policy as a project” from the Cyber Security Policy Guidebook, taking into account the security cycle.

Submission Requirements

  • Document (MS Word)
  • Microsoft Project (MS Project)

Section 1

Write a three to four (3-4) page paper in which you:

  1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.
  2. Describe how your researched large organization uses “policy as a project” in its program.
  3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.
  4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.

Section 2

Using Microsoft Project, or an open source alternative such as OpenProj, to:

5.  Record all tasks, subtasks, resources, and time related to the security cycle.

6.  Outline the organization’s business, the systems, mission, and / or risk management phases in your design.

7.  Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Discuss cybersecurity strategies and the various frameworks.
  • Discuss the threats of modern technology in the workplace.
  • Discuss how policies play an important role in techniques adopted for cybersecurity.
  • Use technology and information resources to research issues in information assurance.
  • Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now
Place Order

Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp