Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Cyber

Need help with a question

Week 1 – Due ASAP

ATTENTION: Microsoft Project is RECOMMENDED for this task. Microsoft Project may be downloaded for free from the University (not available for MacBooks). The instructions for downloading MS Project may be found under “Course Resources” and “Student Success Guide”. If you have problems with the instructions, contact Technical Support for assistance. Alternatively, the assignment may be completed using Microsoft Excel by creating the GANTT chart in a worksheet (required for MacBook users).

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

In our readings, the CISO is described as “a program manager who leads activities related to a collection of projects, operations, and activities managed as a group.” One of the activities involved with this is creating and managing a security portfolio.

Part 1

Develop a 1- to 2-page matrix using the 
Wk 1 Assignment Template that identifies 5-7 key components in creating a security portfolio.

Part 2

One of the tools you will use in project management is Microsoft® Project. As a CISO, you may not be the person who actively creates the project in Microsoft® Project, but you will need to be aware of what this tool is used for in planning projects with regard to time, resources, and budget constraints.

Read the following scenario:

The CISO manages a portfolio for a company that operates in the emergency response sector. One of the projects in the portfolio is the establishment of an emergency response center starting from a single cold site so as to eventually establish a 30-station network.

Using the Gantt chart view in Microsoft® Project, 
create a task list/work breakdown structure. Create one task “Stand up Cold Site.” All other tasks are subtasks under this one. Using Project—Project Information, input the Start date as today’s date for the Project (do not input any other dates for any tasks). Under this task, create subtasks with logical dependencies for the following:

· Obtain physical site

· Coordinate installation of power, communications, and temperature control

· Install office furniture

· Install computer hardware

· Configure software

· Restore data

· Assign employees to the site

Add resources to subtasks as follows:

· Do NOT enter durations, estimated times, constraints, due dates, etc.

· Input only human resources. Use made-up personnel names and use names of departments or groups where it is reasonable (e.g., information system group, power installation group, system software installation group, security group, etc.).

· Assign them to tasks.

· Be sure to assign people to all tasks.

· Do not worry about people who are over-assigned.

· Do not assign percent of units, costs, hourly wages, etc.

Submit your assignment as a Microsoft® Project file or Microsoft® Excel file.

Week 2 – Due ASAP

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Part 1

You are a newly hired CISO for the largest student loan company in the United States. Recently, the company launched a new online lending self-service platform targeted at working adults worldwide.

The new platform replaces an out-of-date lending system based on emails for processing loan applications. The online platform will be hosted in a multi-tenant data center and managed by outsourced IT staff. However, the security will be monitored by your internal security team. 

Recently, the project has been delayed because of unanswered security concerns about how the company will protect the financial information of job applicants and future students. Your boss has asked you to provide project management to get things get back on track.

Soon after joining the project team, you are asked by the board of directors to illustrate an information security program development model that will be used to secure the new online platform and to provide a project plan for future security assessment activities to measure the security effectiveness of the online platform. They also would like to know how you will categorize resource planning for security monitoring of the online platform so they can make a more informed decision on how best to invest into areas of the company to improve overall security.

Create a 16-slide Microsoft® PowerPoint® media-rich presentation that includes an introduction slide, conclusion slides , and references slides for the board of directors. Your presentation should:

· Outline project management.

· Describe how to use
 3 key areas of an information security program development model of your choice.

· Categorize
 resource planning for security monitoring of the online platform.

· Identify the categories of resource planning, and illustrate how stakeholders, personnel, and technology will be used.

Include all of the required information on the main slides. Speaker Notes 
ARE NOT graded.

 

Part 2

Using the 
Wk 2 Assignment Template,
 create a 1- to 2-page Security Assessment Plan worksheet for two activities. Explain how these activities will measure security effectiveness. In the space below the table, describe how you would implement this plan in Microsoft Project.

 

References and a “Cover Sheet” with your name on it are required for all assignments.

Submit your assignment.

Week 3 – Due 4/7/2024

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Scenario: You have just successfully implemented an online platform at your company. The system has been in production for 6 months processing student loan applications and accepting credit card payments for books and course fees. 

The IT director has been asked by the board of directors (BOD) to build a network operations center (NOC) to provide 24/7 support to customers and internal staff. The IT director begins assembling the team who will design and implement a NOC and asks you to lead the development of a security operations center (SOC) to handle security incidents that the organization may encounter. Since the internal security team already monitors security for the online loan processing platform, it’s expected that developing a SOC is the next logistical step in maturing the security of the organization. 

You are asked by the IT director to 
create a project charter and include a project scoping statement for the SOC project with a primary focus on how the SOC will comply with the various industry and government information security regulations. The IT director also points out that you need to outline how you plan to manage scheduling, cost, teams, and the quality of the project. 

Part 1

Using
 the 
Wk 3 Assignment Template
complete a 2- to 3-page project charter. Develop a clear and understandable project scoping statement as it relates to the scenario.

Part 2

Write a 2- to 3-page plan in which you:

· Describe
 the purpose of a project charter.

· Outline how the triple constraints can affect a project.

· Identify at least 3 model project management phases and describe the purpose of each phase.

· Select one approach to manage scheduling, cost, teams, and quality of a project specifying the use of Microsoft Project or another tool.

· Propose how you plan to resolve personnel and teamwork issues as they arise.

References and a “Cover Sheet” with your name on it are required for all assignments.

Format your assignment according to APA guidelines.  

Submit your assignment.

Bottom of Form

Week 4 – Due 4/14/2024

Assignment Content

1.

Top of Form

Attention: Before beginning work on this assignment, read/review the following Announcements:

·
Instructor Late Assignment Policy

·
Submitting Individual Assignments

·

Plagiarism – Don’t Do It!!

Scenario: As the CISO, you have overseen the security operations center (SOC) implementation and your team has successfully handled a variety of security incidents. The buzz around the company is that the new SOC is friendly and quick to solve incoming requests. However, the NOC implementation has slowed because of project delays and concerns about budget overrun. 

One afternoon the chief financial officer (CFO) turned on her computer and opened an email from someone she knew. After she clicked a suspicious web link, the computer screen suddenly went dark then green text began to fill up the screen saying the computer files had been encrypted. The CFO called the help desk, and the SOC responded immediately. 

You later learned that your CFO was attacked by a new ransomware attack named Petya. The next morning the CFO called you into her office to explain that the board of directors has called an emergency meeting for next week to discuss the impact of the cyberattack and to learn more about how the NOC and SOC are designed to protect the company and its customers from security incidents like ransomware. She has asked you to prepare for a meeting with the board.

Part 1

Develop a 14- to 16-slide Microsoft® PowerPoint® presentation in which you:

· Illustrate the information security portfolio hierarchy and the SOC functions that support the company’s overall security program. The illustration should include at least three SOC functions.

· Describe how security operations processes, policies, and procedures are integrated into SOC functions.

· Explain how you will assess the security effectiveness of the SOC.

· Describe how your approach could mitigate incidents like the Petya attack.

· Illustrate the conflicting roles of security operations personnel in reporting audit findings, and offer a logical prediction of how the SOC plans to address these concerns given your current perspective.

 

 All relevant and required information must be on the main slide. 
Presenter Notes are not Graded.

Part 2

Write a 2- to 3-page handout for the meeting with the board of directors in which you:

· Outline computer security incident response.

· Explain
 the purpose of a security operations center and its staffing.

· Describe at least three differences between security operations processes, policies, and procedures.

· Select one approach to assessing the effectiveness of a security operations center.

· Explain the possibility of conflicting roles of security operations personnel in reporting audit findings to raise awareness to senior management.

Format any references according to APA guidelines.

Note: Images should not be copied unless author permission is obtained or copyright-free images are used. 

 

References and a “Cover Sheet” with your name on it are required for all assignments.

Submit your assignment.

Bottom of Form

Week 5 – Due 4/21/2024

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?