+1(978)310-4246 credencewriters@gmail.com
  

Compile the analyses completed in the last three steps (attached here) into a memorandum from you to your supervisor. This memo should be three pages, excluding Appendices A and B, and should clearly articulate the business case for adopting features from the reviewed security models. It should include the following: The order here should be 3-page max memo, Appendix A, Appendix B, Reference List. The idea is that leadership will read the memo, then look at the Appendices if they need info on details.

Appendix A should incorporated cited research, explaining models, and why each would or would not be recommended for the organization.

The Custom Security Plan (Appendix B) is actually the substantive part of the plan and needs more depth, detail, and development. It must take a holistic look at Cisco’s entire organization’s cybersecurity landscape and contain the following elements:

The security plan should coincide with the organization’s IT vision, mission, and goals.

Include an information security program that aligns with business strategy.

Incorporate all internal and external business functions within the organization’s security programs.

Classify risks according to relevant criteria.

Prioritize threats from both internal and external sources.

Rank the most relevant security attributes for the organization and list them in priority order.

. Use

NIST 800-30

to develop a more detailed Appendix B and Memo.

Incorporate the following feedback for the previously submitted papers:

Project 1, Step 5: Security Weakness Assessment:

There are many additional cyber risks to Cisco as a whole than those you have listed. See pages 17-20 of

https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf

Also, your reference list is not formatted properly. See

https://libguides.umgc.edu/c.php?g=1003870&p=7270651

Project 1, Step 7: Appendix A: Security Models Summary:

This lacks cited supporting research. In-text citations should support your analysis. You should conclude your discussion of each model with a simple statement as to whether or not the model should be adopted by the organization selected for the project, then explain why or why not.

Project 1, Step 10: Appendix B: Custom Security Plan:

This did not meet the requirements for Appendix B.

Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

5.1: Define and appropriately use basic cybersecurity concepts and terminology.

6.2: Create an information security program and strategy, and maintain alignment of the two.

7.3: Evaluate enterprise cybersecurity policy.

9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective

  
error: Content is protected !!