Feedback for Security Plan | My Assignment Tutor

Feedback for Security Plan Recommendation Memorandum Submission Feedback Overall Feedback 5/1 Update The project should begin with an actual memo to leadership- with a detailed Appendix A&B with my suggestions to support your memo One suggested area is to look deeper at the policy elements of your security plan for Appendix B – expand on them further… from a people, process and technology lens… and then connect that to your leadership memo. Appendix B should include a customized detailed customized security plan (more of an operational plan detailing how and what you would examine) for your respective entity. You may want to complete more research for the attributes and what is contained in a complete security plan. I would fortify Appendix B further and include elements of Disaster Recovery and Business Resumption. When you re submit Appendix A – be sure to research further and critically examine the models and determine which model would best fit your entity? This submission could be developed further and also include other areas of vulnerabilities such as relationships between physical and cyber security practices? Networks? Separation of Duties? Are special projects treated differently than normal projects? Please Resubmit. Please submit everything for this milestone as one document. with the memo, and fortified with Appendix A and B. SCORING RUBRIC Associated Learning Objectives Learning Objective 5.1.1: Compare and contrast cybersecurity and computer security. Assessment Method: Score on Criteria – 5.1: Define and appropriately use basic cybersecurity concepts and terminology. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Learning Objective 5.1.2: Discuss networks and protocols. Assessment Method: Score on Criteria – 5.1: Define and appropriately use basic cybersecurity concepts and terminology. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Learning Objective 5.1.3: Discuss basic cybersecurity concepts and vulnerabilities. Assessment Method: Score on Criteria – 5.1: Define and appropriately use basic cybersecurity concepts and terminology. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Learning Objective 5.1.4: Assess common cybersecurity vulnerabilities and associated attacks. Assessment Method: Score on Criteria – 5.1: Define and appropriately use basic cybersecurity concepts and terminology. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Learning Objective 5.1.5: Discuss cybersecurity flaws that can exist in software. Assessment Method: Score on Criteria – 5.1: Define and appropriately use basic cybersecurity concepts and terminology. Required Performance: Meets Performance Requirements Level Achieved: Meets Performance Requirements Learning Objective 6.2.1: Design a cybersecurity strategy that coincides with IT vision, mission and goals. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 6.2.2: Create an information security program that aligns with business strategy. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy, and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 6.2.3: Incorporate all internal and external business functions within the organization’s security program. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy, and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 6.2.4: Create the organizational structure to operate the security program and to align with the entities of the organization as a whole. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy, and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 6.2.5: Communicate the policies and procedures necessary for a security program. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy, and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 6.2.6: Evaluate the effectiveness of a security program. Assessment Method: Score on Criteria – 6.2: Create an information security program and strategy, and maintain their alignment. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 7.3.1: Differentiate among the various concepts of enterprise cybersecurity. Assessment Method: Score on Criteria – 7.3: Evaluate enterprise cybersecurity policy. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 7.3.2: Develop an implementation plan for enterprise cybersecurity policies. Assessment Method: Score on Criteria – 7.3: Evaluate enterprise cybersecurity policy. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 7.3.3: Assess the major types of cybersecurity threats faced by modern enterprises. Assessment Method: Score on Criteria – 7.3: Evaluate enterprise cybersecurity policy. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 7.3.4: Discuss the principles that underlie the development of an enterprise cybersecurity policy framework. Assessment Method: Score on Criteria – 7.3: Evaluate enterprise cybersecurity policy. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 9.2.1: Identify threats, risks, and vulnerabilities to achieve a holistic view of risk across the entity. Assessment Method: Score on Criteria – 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 9.2.2: Classify risks according to relevant criteria. Assessment Method: Score on Criteria – 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 9.2.3: Explain system and application security threats and vulnerabilities. Assessment Method: Score on Criteria – 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 9.2.4: Prioritize cybersecurity threats from internal and external sources. Assessment Method: Score on Criteria – 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements Learning Objective 9.2.5: Employ network analysis tools to identify software communications vulnerabilities. Assessment Method: Score on Criteria – 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Required Performance: Meets Performance Requirements Level Achieved: Does Not Meet Performance Requirements

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *