Description

CMP 610 7631 Foundations in Cybersecurity Management.

Project 1
Scene 1
You have just taken a position as the chief information security officer at your organization. John Williams, the chief technology officer and your new boss, stops at your office door. “I know you’re busy, but I’d like you to come by my office when you get a chance.”
Excited about the prospect of something new, you grab a pen and paper and walk to John’s office.
Scene 2
John says, “Thanks for coming over so quickly. I’ll get right to the point. As the CISO, I’m sure that you’re aware of the recent Office of Personnel Management breach, and the impact that this has had on our industry.
John continues, “I’m sure that you also realize the heavy burden on our department to protect our organization’s assets and information. I would like to make sure that a similar situation doesn’t happen here. My first step toward preventive measures is to develop new policies and procedures that better protect our data.”
John sits at his desk and begins typing while he says, “That brings me to why I asked you here. While I begin my review of current policies and procedures, I would like you to help me by drafting a custom security plan that best fits our organization.”
John continues, “You should start by analyzing our security weaknesses, or vulnerabilities, then continue with reviewing existing security models and analyzing which attributes are best suited for our organization.
“You will look at the pros and cons of each model, which attributes are best suited for us, and the reasoning behind your conclusions. You will need to submit your completed report to me with a drafted security plan in two weeks.”
As a new employee, you realize that this is a great opportunity to show your new boss how you can make a positive contribution to your organization.
You know you have enough time to complete your analysis if you start right away.

Sample Solution

This question has been answered.

Get Answer