Most companies and agencies implement security models to protect the confidentiality, integrity, and availability (CIA) of information and data. As security vulnerabilities and threats continue to evolve, security systems need to adapt to effectively protect data and systems.
This is the first of four sequential projects for this course. In this project, you will evaluate existing security models and their attributes and ultimately recommend a custom security plan to your assigned organization.
You will also evaluate the pros and cons of implementing particular model attributes based on the type of organization and employees in relation to CIA.
To complete the project, you will write a report on the importance of security models in organizations like yours and identify the vulnerabilities of the organization.
There are 14 steps in this project. Begin by reviewing the project scenario and then proceed to Step 1.
Competencies
Your work will be evaluated using the competencies listed below.
- 5.1: Define and appropriately use basic cybersecurity concepts and terminology.
- 6.2: Create an information security program and strategy, and maintain alignment of the two.
- 7.3: Evaluate enterprise cybersecurity policy.
- 9.2: Vulnerability Assessment: Rank the vulnerabilities of a system from a disaster-management perspective.


0 comments