Question: Cybersecurity power point presentation. Evaluate the security models, deployment and management of the security of information systems and methods available to identify and reduce risk.
Cybersecurity power point presentation.
"Evaluate the security models, deployment and management of the security of
information systems and methods available to identify and reduce risk.
For this
part, consider the debate statements from Student A and Student B
You will then need to explain relevant terms and concepts in their statements, add further material as
part of an overall evaluation and then prepare for the justification.
Student A states Policy and standards such as ISOs are the most important consideration before
attempting to evaluate and reduce risk for stakeholders. Understanding formal business methods and
having support from senior management should be the main focus of risk reduction processes.
Student B states Understanding core models such as the CIA Triad, the Parkerian Hexad and knowing
how to find information about current vulnerabilities such as CVEs is far more important from a
practical day to day perspective for stakeholders for evaluating methods to identify and reduce risk.
You will need to evaluate available ISOs and select one ISO to discuss the key aspects of that ISO with
respect to security models, deployment and management to identify and reduce risk.
Likewise, you need to explain the other key models and terms to demonstrate an appropriate
evaluation of those models and terms with respect to identifying and reducing risk.
In all cases the material you present for the content for this part must go beyond Netacad.
You cannot use the NIST CSF to answer this question.
Justification: For this justification you will select either Student A or Student B and justify why their
debate statement is appropriate for the specific stakeholders that you have selected. As with Part One
it is acceptable to justify one debate statement for one stakeholder, and the other debate statement
for the other stakeholder.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
