• Home
  • Blog
  • CMP 610 Foundation in cybersecurity Management: Security Model

CMP 610 Foundation in cybersecurity Management: Security Model

0 comments

Most companies and agencies implement security models to protect the confidentiality, integrity, and availability (CIA) of information and data. As security vulnerabilities and threats continue to evolve, security systems need to adapt to effectively protect data and systems.

This is the first of four sequential projects for this course. In this project, you will evaluate existing security models and their attributes and ultimately recommend a custom security plan to your assigned organization.

You will also evaluate the pros and cons of implementing particular model attributes based on the type of organization and employees in relation to CIA.

To complete the project, you will write a report on the importance of security models in organizations like yours and identify the vulnerabilities of the organization.

There are 14 steps in this project. Begin by reviewing the project scenario and then proceed to Step 1.

Competencies

Your work will be evaluated using the competencies listed below.

  • 5.1: Define and appropriately use basic cybersecurity concepts and terminology.
  • 6.2: Create an information security program and strategy, and maintain alignment of the two.
  • 7.3: Evaluate enterprise cybersecurity policy.
  • 9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}