Question: Background The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks

Background

  • The objective of this project is to develop an audiovisual presentation on how administrative, technical, and physical controls can be applied to mitigate risks to an organization's computing environment.
  • Approach the project as if you are recommending a cybersecurity solution to an organization in one of the following verticals: defense, e-commerce, education, energy, financial, healthcare, manufacturing, retail, travel and tourism, transportation, etc.

Implementation Plan

  • Include problem statement and recommended solution slides from previous deliverable for reference.
  • Explain the risks that BYOD paused to the organization's critical computing resources and ways to mitigate that risk in a cost-effective manner.
  • Demonstrate how the use of encryption can be used to enhance authenticity, confidentiality, integrity, and non-repudiation in the organization.
  • Given a combination of malware attack on key systems coupled with BYOD and endpoint security, develop a plan to effectively implement your proposed solution.
  • The plan should include the implementation flow diagram (order of major tasks), required resources, and high-level procedures.
  • Formulate a cost-benefit analysis (CBA) using existing conceptual frameworks. See Appendix A for more information.
  • Describe how the solution will be validated before deployment.
  • Describe how the solution will be evaluated and continuously improved in operation.
  • Describe how the solution, data and software, will be decommissioned once it reaches end of life.
  • Discuss any legal, ethical, and cultural considerations associated with the solution.

A template file is provided below for your deliverable.

Implementation Plan

Criteria

Include problem statement from previous deliverable

Include recommended solution from previous deliverable

Implementation flow diagram (Malware, BYOD, Encryption)

Cost-Benefit Analysis (CBA)

Solution validation

Solution evaluation and continuous improvement

Decommission

Legal, ethical, and cultural considerations

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!