Assignment 1Case Study3pagesSelect a recent, within ten years, cybersecurity case in which security broke down, or were security was breached. Target, Equifax, Home Depot, Sony, the OPM are common topics, and one may chose one of these, but I would prefer if one found a less common, but equally challenging case to evaluate.After your introduction, lay out the case, what happened, and why, and what the mitigation was and ultimate result. Then lay out what you would have done differently to have better secured the information, and/or how you would have responded and mitigated the breach of security.Your conclusion will be the specific lessons you want the reader to learn from your evaluation, and recommendations on how to prevent future situations from developing. Then have a strong concluding paragraph.The conclusion is the reason for most academic and real world papers, and is never just a single block of text, or single paragraph.Use narrative paragraphs, not bullets, nor headers.There is no length requirement, though this type of paper usually goes beyond five to seven pages. Your topic, analysis, and conclusion drive the length of the paper, not some made up number by a professor. Locate at least five to ten resources minimum outside sources from the government, cybersecurity industry, etc. as well. for this assignment.Note:Wikipedia and similar websites do not qualify as quality resources.Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are: Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills.This is only a guideline for ideas, not a mandatory rubric. You choose how to respond to the above essay topic.The most common problems are: Poor paragraph structure, pronoun usage – don’t use we or you, make sure when using they you have the proper antecedent. That is don’t use they with collective nouns or with he or she, make sure that the plural noun you are referring to was the last plural noun before the pronoun.Use percent, not %, don’t use headers, don’t use bullets to write the paper, don’t use quotes to write the paper. Use quotes to support ideas.—————————————————————————Assignment 2Disaster Recovery PlanThis assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.In recent years, organizations have witnessed the impact of having effective and non-effective business continuity plans and disaster recovery plans. In today’s environment, with significant potential natural disasters, terrorist threats, and other man-made threats, it is critical that organizations develop effective business continuity plans and disaster recovery plans. Select an organization that you are familiar with, such as where you currently or previously have worked, contact a local organization, or search on the Internet for the needed detail of an organization you are interested in. Prepare a disaster recovery plan policy for that organization.Part 1: Written Paper1.1. Write a six page paper in which you:a. Provide an overview of the organization that will be delivered to senior management, defining the business goals and objectives and the size, layout, and structure of the organization. b. Include a diagram of the organization’s network architecture and the proposed network architecture of an alternate computing facility in the event of a disaster (or the actual network architecture of the alternate computing facility if one already exists) through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. c. Develop the DRP Policy, including:i. Disaster declarationii. Assessment of securityiii. Potential disaster scenarios and methods of dealing with the disasteriv. Disaster recovery proceduresd. Develop an Incident Response Team (IRT) charter, which includes the following sections:i. Executive summaryii. Mission statementiii. Incident declarationiv. Organizational structurev. Roles and responsibilitiesvi. Information flow and methods of communicationvii. Methods and services provided by the IRTviii. Authority and reporting proceduresYour assignment must follow these formatting requirements: This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.Part 2: PowerPoint Presentation Use Microsoft PowerPoint to:2. Create a twelve 12 slide presentation that will be presented to the agency’s management, in which you:a. Summarize the elements of the DRP Policy and IRT Charter, covering the main elements from Steps 3 and 4 above.b. Include an introduction and conclusion slide.The specific course learning outcomes associated with this assignment are: Describe the different ISS policies associated with risk management. Compare and contrast the different ISS policies associated with incident response teams (IRT). Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.
Acegraderesearch.com is a custom writing service that provides online on-demand writing work for assistance purposes. We are using Google Analytics to enhance your experience. No personal data is being tracked.
Phone: +1 (518) 418-5947
Using this service is LEGAL and IS NOT prohibited by any university/college policies. You are allowed to use our model academic papers for revision purposes only