[Get Solution] Nontechnical Audience
Start HereAttack Vector Solutions[Music]As you complete your morning login routine, you notice an urgenmessage from John, the chief technology officer.See Me ASAP!!You grab your tablet and stylus and rush to Johns office.John gives you a friendly greeting as you enter his office, but he looksconcerned.Good morning, John says. I appreciate you dropping everything andcoming by so quickly. I need your help with a high-level matter. Topexecutives are meeting to prepare for the quarterly meeting with theboard of directors. They would like to review the current vulnerabilitiesand threats that the organization has in regards to our technology,people, and cybersecurity policies. The board will also be asking aboutour ability to educate the organizations population on not only ourpolicies and practices, but also the need for them. I need to prepare apresentation for the board meeting. However, I have several otherurgent matters to oversee.John continues, I need you to prepare my presentation by reviewingcommon attack vectors, analyzing our vulnerabilities, and preparingrecommendations on what we should do to protect ourselves. Inaddition, I need a brochure to show the board what we are doing toeducate the organization on these issues. I need this review in twoweeks.You are grateful for Johns trust in allowing you to put together hispresentation for the board, and now youre eager to show that his faithin you is justified.You will have to combine your technical and research abilities to comeup with the recommendations, and present them in a professionalmanner.[Music]Organizations must implement countermeasures to protect informationand data that are vulnerable to cyberattacks. As new security threatsare introduced, these countermeasures must be evaluated andimproved.This is the final of four sequential projects. In this project, you willinvestigate common types of cyberattacks and possible solutions,evaluate the costs of implementing identified countermeasures, andcommunicate the recommended solution to a nontechnical audience.You will present to management the most likely attack vectors againstyour organization and suggest solutions ranked by cost andeffectiveness. You will also suggest how the mix of identified state andnonstate actors should affect policy-maker decisions and policydevelopment for critical infrastructure protection.There are 14 steps in this project. Begin by reviewing the projectscenario and then proceed to Step 1.CompetenciesYour work will be evaluated using the competencies listed below.? 5.2: Examine architectural methodologies and components usedin the design and development of information systems.? 6.2: Create an information security program and strategy, andmaintain alignment of the two.? 7.2: Evaluate international cybersecurity policy.? 7.3: Evaluate enterprise cybersecurity policy.? 8.2: Evaluate specific cybersecurity threats and the combinationof technologies and policies that can address them.Step 1: Define Vulnerabilities, Threats, and RisksVulnerabilities, threats, and risks are important to understand in orderto evaluate and ultimately improve security posture by mitigating risks.Your organizations security posture will determine its cybersecuritypolicies. Assessing risk is key in this process.Define vulnerability, threat, and risk. Consider their relationship to oneanother and how they relate to the security of networks and data.
So much stress and so little time? We’ve got you covered. Get your paper proofread, edited or written from scratch within the tight deadline.