Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Comp1002 Security And Networks: Cybersecurity Assessment Answers

Develop a cybersecurity measurement for the organization. create an environment which will protect the data and the activities on the internet.

Answer:

Rationale:

In the recent time the number of cybercrime is increasing rapidly so it is necessary for the organization to develop a cybersecurity measurement for the organization. The businesses and the companies are in front of the risks as they are over dependent on the information technology. The decision maker and the policy makers are managing the challenges without concerning about the consequences of the risks. It is necessary for the business or the organization to establish a proper cyber security so that the data get safe and will not be breached by the cyber attackers (Dark et al., 2015). It is necessary to identify the particular risk and then apply the proper method of cyber security.

Problem Domain:

There are many problem that are associated with cyber security implementation because day by day the scenario of cyber-attacks are changing rapidly. Several techniques of cyber-attack needs different method of cyber security. Many old problems that are used earlier for cyber-attack is used now a days like the ransom ware attack. It is a major worry for the cyber security officer to implement all the measures properly according to the requirement (Phillips, 2017). The cyber assets and the sensitive data must be protected from being violated. To protect the data integrity it is necessary to develop a project of cyber security that will mitigate all the risks associated with cybercrime.

Purpose:

The main purpose of the project is to create an environment which will protect the data and the activities on the internet. Cyber security project will be applied to the several business and the organization to provide data security on the organization (August & Learning, 2015). The vision of the project is to provide cyber security solutions continuously to the organizations that are in the market right now. In the recent time the amount of problem related to cyber security is increasing rapidly. As the data rate is increasing the amount of the cyber-attacks also increased to attack the sensitive data of the victims. These attacks has a huge impact on the victims as their digital identity is also at stake so it is necessary for the individuals also to protect their own data by apply several precautions of cyber security (Chapman, 2017). There are many strategic objectives of the project which encounter with the new risks that are identified in the current market of the information technology.

Sponsor or Supervisor Recommendation:

In the recent time the data is being stored on the cloud platform. The cloud has three different services SaaS, PaaS and IaaS. Among these three the SaaS is less secure as the data is protected by the SaaS provider to it is necessary and recommended that proper security measures must be taken to secure the data when the data will be migrated to the SaaS. It is required to the project supervisor to assess all the requirement and the after consequences while implementing the cyber security project (Knowles et al., 2015). The pattern of cyber-attacks is changes as the time goes on so it is necessary for the project sponsor to make the development which will be capable of tackling the future attacks as well. The project must follow all the assessment while implementing otherwise there will be chance that the project might get fail.

Theoretical Framework: 

It is necessary for any kind of project to describe the theoretical framework properly so that it will guide all the processes that are related with the project. In the project of cyber security implementation it is necessary to assess the conceptual and theoretical framework properly, so that all the processes of the cyber security project will be implemented properly. By the use of the framework the developer will assess the future prediction of the project like whether the project will succeeded or not (Schoitsch et al., 2016). The framework will be made by running some inductive processes.

Methodology:

Methodology is the main part for many project development, in this part the project method is chosen and the requirement that are needed for developing the project.

Research & System Development Method:

The methodology that will be used in the project development is the agile methodology. In the development of cyber security project many requirements will be followed and the requirement will change over a certain time period. For these changing requirement the length of the project development gets higher. Agile methodology is best suited for this kind of project because agile methodology is flexible as it will help the projects to make changes whenever required. The processes of the project is done in a linear and sequential manner so the project completed successfully without any error (Fukushima & Sasaki, 2016). It is efficient because it emphasizes on the people interaction rather than the use of tools.

For a successful implementation of cyber security project it is necessary to identify the problem and the project definition, which will contribute to the whole project. For this, a progressive and a structured approach is taken for analysing the risks that are associated with the cybersecurity. Losses that has potential for the information technology needed to be identified first and then quantified (Carr, 2016). The developer who will make the project must analyse the risks first then make their decision that how to implement the project. The development must be done in several steps so that the project is successfully implemented.

Data Collection Method:

For these project both the qualitative and quantitative data collection will be used. As the main job is to collect the risks that people are facing right now. For the data collection many different method will be used. Surveys will be in a zone to know exactly what kind of cybercrime has been happening in those area then planning the project as per the data (Tetrick et al., 2016). Documents and old records will be followed also for seeing the old trend in this technology.

Ethical Issues:

Ethical issues are some action that will rise if an approach is taken in a wrong way. The hackers are exploiting the system as they want without the concern of the victim. Many ethical issues are there for the project development. The developer must not abstract the cyber security procedure of implementation, the report of the project must be correct. The responsibility must be accepted which is assigned to the developer for making the project if not then it will be unethical.

Compliance Requirements:

For this project of cyber security many compliance requirements are needed. The main requirement is the legal permission for the project which had to be taken from the government. Then the project must get certified as per the projects standards. The workplace where the project is made is needs several requirements as well.

Analysis of Data:

Data that are collected from the interview or from the survey needed to be analysed properly so that the project meet all the requirements. If all the requirements of the project is met then it will be able to mitigate all the risks that are associated with the cyber security (Brangetto & Aubyn, 2015). The source of the data must be genuine otherwise it will be difficult for the project developer to develop the project as per the need and requirements.

Project Plan:

Duration:

WBS

Task Name

Duration

Start

Finish

Predecessors

0

Cybr security

59 days

Wed 27-06-18

Mon 17-09-18

 

1

Developing the Cyber Security Project

25 days

Wed 27-06-18

Tue 31-07-18

 

1.1

Project Team Making

2 days

Wed 27-06-18

Thu 28-06-18

 

1.2

Survey

5 days

Fri 29-06-18

Thu 05-07-18

2

1.3

Cyber security design

5 days

Fri 06-07-18

Thu 12-07-18

3

1.4

Examination of security ystem

6 days

Fri 13-07-18

Fri 20-07-18

4

1.6

Project proposal Making

7 days

Mon 23-07-18

Tue 31-07-18

5

2

Data Collection Method

8 days

Wed 01-08-18

Fri 10-08-18

 

2.1

Analysing the Cyber Security Risks

4 days

Wed 01-08-18

Mon 06-08-18

7

2.2

Assesment of collected data

4 days

Tue 07-08-18

Fri 10-08-18

10

2.4

Data Collection Completed

0 days

Fri 10-08-18

Fri 10-08-18

11

3

Implementing Architecture of Cyber Security

22 days

Mon 13-08-18

Tue 11-09-18

 

3.1

Assessment of the requirments

1 day

Mon 13-08-18

Mon 13-08-18

13

3.2

Making the implementation method

3 days

Tue 14-08-18

Thu 16-08-18

15

3.3

Structure the whole architecture

5 days

Fri 17-08-18

Thu 23-08-18

16

3.4

Installing the require measurement

6 days

Fri 24-08-18

Fri 31-08-18

17

3.5

Final analisys of whole structure

7 days

Mon 03-09-18

Tue 11-09-18

18

3.7

Architecture Done Properly

0 days

Tue 11-09-18

Tue 11-09-18

19

4

Executing The Final Project

4 days

Wed 12-09-18

Mon 17-09-18

 

4.1

Transition Period

1 day

Wed 12-09-18

Wed 12-09-18

21

4.2

Test Application

1 day

Thu 13-09-18

Thu 13-09-18

23

4.3

Progress analysis

1 day

Fri 14-09-18

Fri 14-09-18

24

4.4

Final Execution

1 day

Mon 17-09-18

Mon 17-09-18

25

4.5

`Project Completed

0 days

Mon 17-09-18

Mon 17-09-18

26

WBS:

Fig 1.1 Created By Author

Gantt chart:

Fig 1.2 Created By Author

Risks Analysis:

Sl. No.

Risks

Impact

Probability

1

Project cost

V H

H

2

Timeline

H

H

3

Less Employee for the project

V H

M

4

Tools Issue

H

L

5

Less number of application

V H

V L

6

Old risks with cyber security

M

L

7

Infected systems

H

V L

8

Wrong implementation

V H

V L

9

Wrong assesment

H

M

10

Less resource

L

V L

Risk Matrix:

Following is the risk matrix based on the analysis driven in the above section:

Probability

V H

5, 8

 

3

1

 

H

7

4

9

2

 

M

 

6

   

L

10

    

V l

     

V L

L

M

H

V H

Impact

References:

August, M. B. A., & Learning, M. (2015). RICARDO A. CALIX, PH. D. Cell, 225, 315-5655.

Brangetto, P., & Aubyn, M. K. S. (2015). Economic aspects of national cyber security strategies. Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: project report. Annex, 1, 9-16.

Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International Affairs, 92(1), 43-62.

Chapman, M. A. (2017). Cybersecurity Workforce Development and the Protection of Critical Infrastructure. University of Hawaii Pearl City United States.

Dark, M., Bishop, M., Linger, R., & Goldrich, L. (2015, May). Realism in teaching cybersecurity research: The agile research process. In IFIP World Conference on Information Security Education (pp. 3-14). Springer, Cham.

Fukushima, S., & Sasaki, R. (2016). Proposal and evaluation of method for establishing consensus on combination of measures based on Cybersecurity Framework. Cyber-Security and Digital Forensics, 155.

Knowles, W., Prince, D., Hutchison, D., Disso, J. F. P., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, 52-80.

Phillips, C. (2017). Cybersecurity Risk Assessment of Company X (Doctoral dissertation, California State University San Marcos).

Schoitsch, E., Schmittner, C., Ma, Z., & Gruber, T. (2016). The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In Advanced Microsystems for Automotive Applications 2015(pp. 251-261). Springer, Cham.

Tetrick, L. E., Niu, Q., Fletcher, L., & Steinke, J. A. (2016). Creativity and Innovation in Cyber Security Work. In Psychosocial Dynamics of Cyber Security (pp. 141-164). Routledge.


Buy Comp1002 Security And Networks: Cybersecurity Assessment Answers Online


Talk to our expert to get the help with Comp1002 Security And Networks: Cybersecurity Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Comp1002 Security And Networks: Cybersecurity Assessment Answers Assignment Help Online


Copyright © 2009-2023 UrgentHomework.com, All right reserved.