CMP 610 UMUC Identify Countermeasures Computer Science Worksheet

User Generated

pzpnfgryybag

Computer Science

CMP 610

University of Maryland University College

CMP

Description

Step 8: Identify Countermeasures

Now that you have assessed your organization’s vulnerability, you are ready to identify possible countermeasures. Identify specific countermeasures that will address the vulnerabilities/threats to your organization that you summarized in the previous step.

Review best practices, as well as any published mitigations for the specific weaknesses, identified. Include both cyber defenses and, as appropriate and legal in the United States, cyber offenses (cyber offensives/warfare). Make sure to address key cybersecurity technologies, methodologies, standards, and legal compliance.

Record the findings to be included in your upcoming white-paper resource for the final presentation.

You will need to figure out the cost of your security solutions, and you will do that in the next step.

Step 9: Determine the Cost of Security Solutions

Once you have identified possible countermeasures for your organization, you will need to determine their cost. Discuss the relative financial impact of these countermeasures, considering appropriate technology and policy changes to address cyber threats at the enterprise, national, and international levels as a result of procurement, implementation, and maintenance. Also, consider the policy and technology trade-offs at each level.

Rank the countermeasures according to cost and effectiveness. Record your findings to be included in your upcoming white-paper resource for your final presentation.

In the next step, you will be asked to consider how successful your mitigations will be.

Step 10: Assess the Potential Success of Mitigations

Now that you have identified countermeasures and their costs, develop an assessment of the likelihood of success of the mitigations when implemented as you prescribe. Criteria to be considered should include the following:

  • ease of implementation (technically as well as from a policy perspective)
  • ease of adoption by the workforce
  • impact on the ability to perform the organization's work (e.g., is productivity affected are additional steps required that impede workflow?)
  • record of success of this mitigation on the same/similar weakness
  • cost (as a factor of the overall budget of the organization, e.g., will significant trade-offs have to be made in order to invest in this solution?)
  • leadership support

Record the findings to be included in your upcoming white-paper resource for the final presentation.

Step 11: Submit the Countermeasures White Paper

Compile your findings from the last three steps and submit a three-page paper that describes the countermeasures, cost, and potential challenges with implementing them in your organization. This paper will provide much of the basis for your final presentation. Make sure to include the following:

  • critical issues in cybersecurity management and technology policy
  • principles of cyber warfare theory and application (cyber offensives/warfare)
  • various concepts of enterprise cybersecurity
  • cybersecurity standards organizations
  • key initiatives in international cybersecurity policy advances

Submit your paper for feedback.

Follow steps 8-11 in order to complete the three-page paper(needs to have a cover page, table of contents, and reference page).

The final submission should be the three-page paper.

Unformatted Attachment Preview

Vulnerability assessment Characterization of current and emerging vulnerabilities and threats. As an airplane company, Boeing's current and emerging vulnerabilities and threats are categorized as technology, people, and policy. Technology Boeing uses technology to enhance corporate communication, manage data and program its airplanes. Technology apparatus like web and email servers within computers use the internet to facilitate the transmission of messages. Also, web servers are compatible with cloud computing to store terabytes of confidential information. Technology apparatus are vulnerable to cybersecurity issues due to poor password maintenance, viruses, and malware attacks. Thus, Boeing should employ sophisticated and adequate security measures to prevent potential cyberattacks. People Boeing Company has numerous employees working in various sectors who can cause insider threats, leading to cybersecurity issues. For instance, employees in charge of Information Technology can comprise Boeing's databases, causing data breaches. Besides, passwords can leak to other employees, contributing to unauthorized access and hacking. Employees can mastermind insider threats like data theft and disclose information to rival companies. Insider threats interfere with organizational performance as it poses a significant risk to operations. Policy Security policies help prevent the occurrence of cybersecurity issues by guiding employees on data management and the protection of databases. Organizations should have policies that address data security. Failure of which, the company can experience cybersecurity issues like hacking and insider theft. Boeing should incorporate cybersecurity standards and measures within its policies to bolster cybersecurity. Identification of Attack Vectors Boeing is prone to the following attack vectors: insider threats, email phishing, ransomware, weak login credentials, and poor encryption and system configuration. Attackers can exploit operating systems and software through ransomware, insider threats, poor encryption, and system configuration. However, telecommunications can be exploited through email phishing. Finally, the hardware and human factors can be exploited through weak login credentials and insider threats. Thus, Boeing should educate employees on security measures like having stronger login credentials, encryption, and system configuration. Additionally, Boeing should adopt access control, authorization, and authentication systems to prevent insider threats and other potential cybersecurity issues like data theft. Boeing should deploy these measures at once to curb data security problems. Boeing can also deploy security measures like Intrusion detection system (IDS), intrusion prevention system (IPS), and network segmentation to combat cybersecurity issues. Information system auditing through analysis, evaluating and testing is also crucial to safeguard confidential data and files. Finally, Boeing can adopt risk management standards like COBIT, OCTAVE, FAIR, RMF AND TARA to enhance data protection Impact of Vulnerability on Boeing People (Employees) – High Technology – High Policy - Medium
Purchase answer to see full attachment
Explanation & Answer:
3 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Running Head: CYBER WORLD PROJECT

CMP 610_Project 4

Student Name

Institutional Affiliation

Course Name

1

CYBER WORLD PROJECT

2
Table of Contents

Title Page ................................................................................................................................... 1
Table of Contents ....................................................................................................................... 2
Critical Issues in Cyber Security................................................................................................ 3
Cybersecurity Threat Countermeasures ..................................................................................... 3
Cost of Security Solutions ......................................................................................................... 4
Potential Success of Mitigations ................................................................................................ 4
Principles of Cyber Warfare and Application ............................................................................ 5
Enterprise Cybersecurity Concepts ............................................................................................ 6
Cybersecurity Standards Organizations ..................................................................................... 6
Critical Initiatives in International Cybersecurity Policy Advances .......................................... 7
References .................................................................................................................................. 8

CYBER WORLD PROJECT

3
Critical Issues in Cyber Security

Organizations such as Boeing face cybersecurity attacks at any time, and these attacks
are expensive. Also, it is financially critical to prevent these attacks (Lehto, 2013). Moreover,
there are several different cybersecurity issues in the modern business landscape. Cyber
security issues include social engineering, ransomware, cloud co...

Similar Content

Related Tags