Enjoy the best grades that will raise your GPA.

Category: Cryptography (Page 1 of 2)

The power point below shows step-by-step how to create an outline. Please start

The power point below shows step-by-step how to create an outline. Please start the outlining form in sections 4, 5 and 6, slides 45–61. The subject of the project plan is Chase Bank. It should be similar to the document below, titled “Annotated Outline.”
Also, follow these requierments
4.1 Highest Prioritized Risks
The section identifies the top 3 risks that you are planning to mitigate in Section 5. Two out of your three risks must address the specific risks that may arise out of the “Situation as You Briefed the BOD and Executive Management” Slide 12 from the Enterprise Information Security Program Plan Project assignment presentation.
Each risk must have the following items included with each risk:
• Asset(s) potentially affected
• Threat or threat actors
• Vulnerability(ies)
• Impact if realized
• Time period that you believe risk remains active.
Use Group results from risk exercise as a starting point.
The resulting risk statement must be in the form of a risk statement-Module 6’s “Risk Exercise will demonstrate how this can be done and what is expected.
Note: This is not meant to be a risk equation, but an understanding of the basic components of the risks that you have identified and how to craft a risk statement
1.1.1 Risk 1
This section will identify Risk 1. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.1.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 1.
1.1.1.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 1.
1.1.1.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 1.
1.1.1.4 Impact if realized
This section will identify the impact if realized of Risk 1. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.1.5 Time period
This section will identify the time period that we believe Risk 1 will remain active.
1.1.2 Risk 2
This section will identify Risk 2. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.2.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 2.
1.1.2.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 2.
1.1.2.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 2.
1.1.2.4 Impact if realized
This section will identify the impact if realized of Risk 2. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.2.5 Time period
This section will identify the time period that we believe Risk 2 will remain active.
1.1.3 Risk 3
This section will identify Risk 3. It will be in the form of a risk statement. The associated items listed above will be addressed.
1.1.3.1 Asset(s) potentially affected
This section will identify the asset(s) potentially affected by Risk 3.
1.1.3.2 Threat or threat actors
This section will identify the treat or threat actors associated with Risk 3.
1.1.3.3 Vulnerability(ies)
This section will identify any vulnerabilities associated with Risk 3.
1.1.3.4 Impact if realized
This section will identify the impact if realized of Risk 3. The impact should tie back to the business being able to achieve its Strategic, Operational, or Tactical objectives.
1.1.3.5 Time period
This section will identify the time period that we believe Risk 3 will remain active.
5 Information Security Policies, Procedures, Standards, or Processes
This section will prioritize listed on Project Plan Assignment using a scale from 1-10 (1 being the highest and 10 being the lowest) and state why our team rated each item the way we did demonstrating a risk-based approach given scare resources for those items listed on Project Plan Assignment. write a summary for this section
6 Information Security Programs
This section needs to address what are the top 4 programs that you as the CISO are to execute within the first 6 months to year with possible identification of additional programs required to execute an effective information security program that counters the identified risks in the Information Security Section. You can include more than 4 program if you wish, but only the first 4 will be graded.
There is an alternative means in grouping risks rather than having them identified in each program, and that approach will be discussed during the programs lab exercise in Module 7.
3.1 Program 1
Name your first program in place of Program 1
3.1.1 What risk(s) stated in the Information Security Section are you addressing with this proposed program
This section identifies which risk(s) from section 4.12 you are addressing with your identified Program 1
3.1.2 Why you are initiating/doing this program
This section answers why you are doing your selected program as it provides context as to how you are addressing the risk(s) identified above.
3.1.3 What you are going to do within the program
This section provides sufficient detail as to what you are doing in your program. It is expected that this section could contain several (more than two) paragraphs detailing what you are going to do. This section does not have to be a book, but should provide sufficient information that one can understand what you are attempting to do. Each paragraph should be between 6-8 sentences in length.
3.1.4 What are your expected outcomes and how are you measuring these expected outcomes
This section identifies what are your expected outcomes and how you are going to measure them. There should be at least 3 measurable items.
3.1.5 What is your timeline for implementation
This section provides an implementation time line as to how long this program will last or it may be a start of a series of programs that will build a capability.

Assignment 5: WK8 Literature Review Instructions: • Review your articles/sources

Assignment 5: WK8 Literature Review
Instructions:
• Review your articles/sources and continue writing your 25 -page literature review due this week.
• Submit your Draft Thesis Or Creative Project Literature Review
• Participate in the Week Eight Forum on Methodology (Forum 8)
Thesis or Creative Project Literature Review (See Appendix 1: MA Theses and Appendix 2: MA Creative Project of the 2012 Capstone Manual)
A 25 page creative project or literature review is due at the end of Week 8. The literature review focuses on how the creative project experience fits into the discipline. Specifically, it introduces the project and places it in a larger context that includes a discussion of how this experience helps the student meet the program objectives. It provides the current state of accumulated knowledge as it relates to the project.
· Describe how completing this project is consistent with the course of study.
· Articulate the objectives the student hopes to achieve through the completion of this project.
· Provide a short conclusion and transition to the next section.
Thesis Literature Review: reviews the literature on a specific research question. The literature review focuses on discussing how other researchers have addressed the same or similar research questions. It introduces the study and places it in larger context that includes a discussion of why it is important to study this case. It provides the current state of accumulated knowledge as it relates to the student’s specific research question.
· Summarize the general state of the literature (cumulative knowledge base) on the specific research question:
– Study one: summarize to include researcher’s findings, how those findings were obtained, and evaluation of biases in the findings.
– Study two: summarize to include researcher’s findings, how those findings were obtained, and evaluation of biases in the findings.
o Include a minimum of at least three of the most important studies.
o Include a short conclusion and transition to the next section.
To help you meet your final paper requirement. Please review the rubric and Capstone Manual for more specific guidelines on expectations; however, please note you are to provide comprehensive analysis of details, facts, and concepts in a logical sequence. You should demonstrate a higher- level of critical thinking necessary for 500-600 level work. You are to provide well-supported ideas and reflection with a variety of current and/or world views in the assignment. You are expected to present a genuine intellectual development of ideas throughout assignment. You should thoroughly understand and excel in explaining all major points. An original, unique, and/or imaginative approach to overall ideas, concepts, and findings is required. Overall format of assignment needs to include an appropriate introduction (or abstract), well- developed paragraphs, and conclusion. Finished assignment demonstrates your ability to plan and organize research in a logical sequence. You are expected to use at least of 25 or more references in your literature review

« Older posts

© 2022 assignmetshive

Theme by Anders NorenUp ↑