Description
Step 8: Identify Countermeasures
Now that you have assessed your organization’s vulnerability, you are ready to identify possible countermeasures. Identify specific countermeasures that will address the vulnerabilities/threats to your organization that you summarized in the previous step.
Review best practices, as well as any published mitigations for the specific weaknesses, identified. Include both cyber defenses and, as appropriate and legal in the United States, cyber offenses (cyber offensives/warfare). Make sure to address key cybersecurity technologies, methodologies, standards, and legal compliance.
Record the findings to be included in your upcoming white-paper resource for the final presentation.
You will need to figure out the cost of your security solutions, and you will do that in the next step.
Step 9: Determine the Cost of Security Solutions
Once you have identified possible countermeasures for your organization, you will need to determine their cost. Discuss the relative financial impact of these countermeasures, considering appropriate technology and policy changes to address cyber threats at the enterprise, national, and international levels as a result of procurement, implementation, and maintenance. Also, consider the policy and technology trade-offs at each level.
Rank the countermeasures according to cost and effectiveness. Record your findings to be included in your upcoming white-paper resource for your final presentation.
In the next step, you will be asked to consider how successful your mitigations will be.
Step 10: Assess the Potential Success of Mitigations
Now that you have identified countermeasures and their costs, develop an assessment of the likelihood of success of the mitigations when implemented as you prescribe. Criteria to be considered should include the following:
- ease of implementation (technically as well as from a policy perspective)
- ease of adoption by the workforce
- impact on the ability to perform the organization's work (e.g., is productivity affected are additional steps required that impede workflow?)
- record of success of this mitigation on the same/similar weakness
- cost (as a factor of the overall budget of the organization, e.g., will significant trade-offs have to be made in order to invest in this solution?)
- leadership support
Record the findings to be included in your upcoming white-paper resource for the final presentation.
Step 11: Submit the Countermeasures White Paper
Compile your findings from the last three steps and submit a three-page paper that describes the countermeasures, cost, and potential challenges with implementing them in your organization. This paper will provide much of the basis for your final presentation. Make sure to include the following:
- critical issues in cybersecurity management and technology policy
- principles of cyber warfare theory and application (cyber offensives/warfare)
- various concepts of enterprise cybersecurity
- cybersecurity standards organizations
- key initiatives in international cybersecurity policy advances
Submit your paper for feedback.
Follow steps 8-11 in order to complete the three-page paper(needs to have a cover page, table of contents, and reference page).
The final submission should be the three-page paper.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.
Running Head: CYBER WORLD PROJECT
CMP 610_Project 4
Student Name
Institutional Affiliation
Course Name
1
CYBER WORLD PROJECT
2
Table of Contents
Title Page ................................................................................................................................... 1
Table of Contents ....................................................................................................................... 2
Critical Issues in Cyber Security................................................................................................ 3
Cybersecurity Threat Countermeasures ..................................................................................... 3
Cost of Security Solutions ......................................................................................................... 4
Potential Success of Mitigations ................................................................................................ 4
Principles of Cyber Warfare and Application ............................................................................ 5
Enterprise Cybersecurity Concepts ............................................................................................ 6
Cybersecurity Standards Organizations ..................................................................................... 6
Critical Initiatives in International Cybersecurity Policy Advances .......................................... 7
References .................................................................................................................................. 8
CYBER WORLD PROJECT
3
Critical Issues in Cyber Security
Organizations such as Boeing face cybersecurity attacks at any time, and these attacks
are expensive. Also, it is financially critical to prevent these attacks (Lehto, 2013). Moreover,
there are several different cybersecurity issues in the modern business landscape. Cyber
security issues include social engineering, ransomware, cloud co...
