support@homeworkmarkettutors.com

Call toll free: +1 (304) 900-6229 or Request a call

This assignment is a twopart deliverable using MS Word and MS Project or their open source equivalents. Note: You may

This assignment is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create or make all necessary assumptions needed for the completion of this assignment.
Use the Internet to research a large organization, reviewing its cybersecurity policy.
Consider what youve learned in Auditors Guide to IT Auditing, and examine the phrase “policy as a project” from the Cyber Security Policy Guidebook, taking into account the security cycle.
Submission Requirements
Document (MS Word).
Microsoft Project (MS Project).
Section 1
Write a 3–4 page paper in which you:
Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.
Describe how your researched large organization uses “policy as a project” in its program.
Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.
Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.
Section 2
Using Microsoft Project, or an open source alternative such as OpenProj:
Record all tasks, subtasks, resources, and time related to the security cycle.
Outline the organization’s business, the systems, mission, and/or risk management phases in your design.
Show in your milestones how you are reducing cybersecurity risk rather than compliance and best practices.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Determine the strategies used in a security policy and how to provide a base for security in its absence.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions