Question: This assignment focuses on applying an information security management model or standard to mitigate a cybersecurity threat or attack type for a fictitious organization. (

This assignment focuses on applying an information security management model or standard to mitigate a cybersecurity threat or attack type for a fictitious organization.
(1) Select one cybersecurity threat or attack - for example, ransomware, insider threat.
(2) Pick one information security management model or standard that will be useful to mitigate the cybersecurity threat/attack chosen in step 1.(See Chapter 8).
(3) Apply the selected information security management model or standard in the context of a fictitious organization. You may choose the organization context and type depending upon your interest or familiarity (Example: Medium-sized healthcare organization, large-sized financial entity, small defense contractor).
(4) Overall, you are expected to present a plan to mitigate the selected cybersecurity threat or attack type for the chosen fictitious organization by applying the security model or standard.
Deliverables:
(10 points) Recorded presentation (along with slide deck) on the selected security model or standard. (30-45 minutes; 30-60 slides)
(10 points) Recorded presentation (along with slide deck) on the plan to mitigate the selected cybersecurity threat or attack type for the ch

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!