Prioritizing Threats Executive Summary

 

Assignment Content

  1. Based on your completed security overview presentation that was “approved for action,” the team would like more information about the type of threats and challenges that should be addressed. They want to know which threats should be prioritized and the impact they have on the organization. They would like you to:

    • Identify common categories of cybersecurity threats.
    • Prioritize categories.
    • Recommend a cybersecurity category to address with the organization.
    • Identify challenges that mobile and cloud computing needs could bring to the organization.
    • Explain the importance of testing for the detection and intrusion of risks.
    • Write a 2- to 3-page executive summary to share with the executive staff about your recommendations, challenges, and explanations. Include the following in your summary:
    • A chart detailing 8 challenges and their impact
    • Your top 5 prioritized categories with a rationale for the prioritization
    • At least two references supporting your top 5 recommendations
    • Note: This executive summary will also be used in the Week 3 assignment.

       

NS!

1 What is the OSI security architecture?

2 What is the difference between passive and active security threats?

3 List and briefly define categories of passive and active security attacks.

4 List and briefly define categories of security services.

5 List and briefly define categories of security mechanisms.

6 List and briefly define the fundamental security design principles.

7 Explain the difference between an attack surface and an attack tree.

700 word discussion: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) When turning theory into practice, the authors stated that it was common for certain observations. What are those observations?

Chapter 16 – Following the chapter reading, the authors assert that the twentieth century is considered as the century of population explosion and fossil fuel burning, environmental policies and the transition to effective use of renewable energy sources as a priority with a strategic focus on specific countries around the world.  In addition, this move has created several different projects whose main focus is to formulate policies associated with climate change and energy governance.  Many of the policies and projects identified aim to support the energy sources switching between fuels like fossils and nuclear power to renewable like solar, wind, and or water.  Specifically, the chapter provides the foundations of policy implementation, and methods as well as investigations of five policy implementation case studies through a comparative analysis. 

700 word discussion: Looking further into the chapter, theoretical grounds of policy implementation, Buse et al., (2012) argue that policy implementation is the execution of a formulated policy – turning theory into practice.  When turning theory into practice, the authors stated that it was common for certain observations.  What are those observations?  

identify, and name those observations,

provide a clear narrative to support your response based on this case study — Not a general definition from the Internet

Information Systems

 Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission of information or data, the systems and processes used for those purposes. In financial industry, how does information assurance applied, in assuring that debit and credit card information and other financial information is protected. 

Need 350 to 400 words and 2 references 

7

Spoofing email is a common occurrence these days.  Have you received a spoofed email?  Briefly, describe the email and how did you notice it was not legit?  Anything else that was odd concerning the spoofed email? 

Discussion about AI

Do you believe Artificial Intelligence or Machine Learning is the future of cybersecurity? Explain why or why not. minimum 300 words in APA format