• Home
  • Blog
  • CMP 610 UMGC Cybersecurity and Computer Security Paper

CMP 610 UMGC Cybersecurity and Computer Security Paper

0 comments

Step 1: Review the Assigned Organization(Capital One)

Familiarize yourself with the organization and breach your instructor has assigned by reviewing the details at https://www.databreaches.net/. The descriptions include an overview and key information about the organization on the internet, as well as information about a breach or attempted breach. For the purposes of this course, you will assume this organization is your employer.

You may wish to briefly research your assigned organization to gather additional information about the organization and its security posture.

Step 2: Write a Cybersecurity Background Summary

In Step 1, you familiarized yourself with your assigned organization. Now, it is time to write a cybersecurity overview. Write a three-page background summary that includes a general overview of cybersecurity and a section on enterprise cybersecurity.

Include the following items in the general overview of cybersecurity:

Include the following items in the enterprise cybersecurity section:

  • List and discuss the major concepts of enterprise cybersecurity, including confidentiality, integrity, and availability (CIA)
  • Discuss the principles that underlie the development of an enterprise cybersecurity policy framework and implementation plan.
  • List the major types of cybersecurity threats that a modern enterprise might face.

You will attach this cybersecurity background summary to the security assessment in a later project step.

Step 3: Analyze Security Weaknesses

After writing the cybersecurity background summary, you are ready to analyze the security weaknesses of your assigned organization. When analyzing cybersecurity weaknesses, there are several areas to consider.

Analyze the organization’s security from the following perspectives:

  1. a technology perspective
  2. a people perspective
  3. a policy perspective

You will include this information in the security assessment. In the next step, you will consider risk factors.

Step 4: Compile a Risk Summary

Now that you have looked at security weaknesses, it’s time to identify areas that should be improved or strengthened, including potential risks associated with maintaining the current security posture. Discuss how you would employ network analysis tools to identify software communications vulnerabilities. Make sure to include the following information:

  1. Classify risks according to relevant criteria.
  2. Explain system and application security threats and vulnerabilities.
  3. Prioritize risks from internal and external sources.
  4. Assess the cybersecurity threats faced by your entity.

You will include this information in the security assessment, which you will compile in the next step.

Step 5: Submit a Security Weakness Assessment

From the information that you gathered in the previous steps, develop a two-page summary of your organization’s security weaknesses. Identify threats, risks, and vulnerabilities to achieve a holistic view of risk across the entity.

Consider areas that should be improved from a technology perspective, a people perspective, and a policy perspective. Also note potential risks associated with maintaining the current security posture. You will reference this security assessment later when you make your business case and final recommendation.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}