, “Key Components of an Information System as Related to the Cyber Domain,” is looking for more information on the

Individual: Defining the Cyber Domain

Instructions:

The Chief Information Officer (CIO) of the organization you chose in the

Week 1 discussion, “Key Components of an Information System as

Related to the Cyber Domain,” is looking for more information on the

cyber domain in hopes of determining the organization’s cybersecurity

needs. As a cyber-security consultant, you believe you can provide the

CIO with the information he needs.

 

Using Microsoft® Word, write a 1- to 2-page communication to the CIO

of the organization. Provide an overview of the following in your letter:

• A definition of the cyber domain and its key components or aspects.

The cyber domain encompasses cybersecurity, a discipline that

involves the following:

 

• Securing computer information, communications systems,

networks, infrastructures, assets

• Protecting them against damage, unauthorized use, modification,

exploitation

• The components of an information system, elaborating on the

similarities to the cyber domain

• An approach to implementing information security for the

organization you chose and how that approach could be expanded to

the larger cyber domain

• The systems development life cycle compared to the cyber domain

life cycle

• The components of the threat environment for the organization you

chose, including an argument that a threat to the organization is also a

threat to the larger domain

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

CYB 100 Week 2 Legal, Ethical, and Privacy Issues in the Cyber Domain  

Individual: Legal, Ethical, and Privacy Issues in the Cyber Domain

 

Instructions:

The CIO of the organization you chose read your letter and would like

to meet with you to discuss the legal, ethical, and privacy issues

governing the cyber domain and directly impacting the organization.

Research the legal, ethical, and privacy issues as they relate to your

chosen organization and the broader cyber domain.

 

Using Microsoft® PowerPoint®, prepare a 12- to 14-slide, media-rich

presentation for the CIO that includes the following:

• Title slide

 

• At least 2 fundamental U.S. laws that impact the organization and

the cyber domain

 

• At least 3 compliance laws and regulations governing the cyber

domain and impacting the organization

 

• At least 4 organizational security issues

 

• At least 3 security technologies used to comply with laws and that

support ethics in information security for the organization

 

Include citations as necessary in APA format.

 

Select the Assignment Files tab to submit your assignment.

CYB 100 Week 3 Security Planning and Risk Management Individual: Security Planning and Risk Management

 

Instructions:

 

Resource: Security Planning and Risk Management Template

The CIO of the organization you chose is ready for you to take a look at

the organization’s potential vulnerabilities and threats.

 

Complete the 1.5- to 2-page Security Planning and Risk Management

Template. Include the following:

 

• Considering the aspects or components of the cyber domain, list

potential vulnerabilities or threats facing the organization.

• Give a description of the risk each vulnerability or threat would have

on the organization in terms of its people, network, data, or reputation.

 

• Explain each risk’s impact on the organization.

 

• Provide a defined mitigation for each vulnerability, such as an

incident response plan, disaster recovery plan, or business continuity

plan. Or, give a defined reason why this vulnerability or threat would not

be mitigated, such as the use of a different risk control strategy.

Include citations as necessary in APA format.

 

Select the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

 

CYB 100 Week 4 Intrusion Detection Individual: Intrusion Detection

Instructions:

 

After reviewing your latest submission, the CIO has found some areas

of concern and would like you to provide a little clarity on one subject.

He is meeting with upper management to persuade them to purchase a

new suite of intrusion detection software for the network. Currently, the

organization has antivirus software and uses firewalls. Provide

justification for adding intrusion detection software (IDS), as well.

Research various IDS that would benefit the company.

 

Create a 2-page table for the CIO to share with upper management.

Include the following:

• Reasons why IDS would benefit the company and the larger cyber

Domain

 

• Descriptions of the categories and models of intrusion detection and

prevention systems

 

• A description of the function of antivirus software, firewalls, and IDS

• Examples of commercial software that could provide the solution

Include citations as necessary in APA format.

 

Click the Assignment Files tab to submit your assignment.

Supporting Material: Assignment Grading Guide

 

CYB 100 Week 5 Roles in the Cyber Domain Individual: Roles in the Cyber Domain

Instructions:

The presentation was a success, and the CIO of the organization you

choose, while pleased, has another task for you. Because of the

overwhelming support he gained from your presentation, he is assigned

with staffing a team to provide the intrusion detection software (IDS)

solution. Therefore, you will provide him with the following information

to consider in his planning:

 

Part A:

Create 1- to 1.5-page summary including the following:

• The number of additional employees necessary to rollout and

support an IDS desktop solution

• An explanation as to how individuals work with the existing desktop

support and malware teams

• The job title for those who normally perform rollout and support

functions for the IDS desktop solution

• An outline of the daily duties for the additional employees hired for

rollout and support functions for the IDS desktop solution

Part B:

Create an infographic using an infographic maker, such as Piktochart,

Venngage, or Canva, displaying an organization chart showing the

following:

• The job titles provided in your summary and how they fit in with the

existing cybersecurity team

• A list of the industry certifications the new IDS rollout-and-support function

employees should have or can work toward

Include citations as necessary in APA format.

Select the Assignment Files tab to submit your assignment.