Project 3

pdf

School

The University of Nairobi *

*We aren’t endorsed by this school

Course

MISC

Subject

Business

Date

Nov 24, 2024

Type

pdf

Pages

6

Uploaded by MagistrateFog22013

Report
8/6/23, 6 : 56 PM Print Pages Page 1 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined Transcript Start Here All organizations rely on information technology to manage their data, operations, and resources. Most enterprises have a cybersecurity plan in place to handle cyberattacks, exploitations, and natural calamities, as well as damage that people cause either deliberately or accidentally. This is the third of six sequential projects in this course. In this project, you will examine your knowledge and familiarity with managerial decisions, policies, and regulations for the workplace. More importantly, it will make you reflect on how policies should grow and evolve in tandem with newer technologies and challenges in the workplace, especially when a new regulatory environment can affect your industry. There are six steps in this project. Begin below to review your project scenario. Industry Comments on Proposed Cyber Standards [Music]
8/6/23, 6 : 56 PM Print Pages Page 2 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined Your work will be evaluated using the competencies listed below. 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. 1.6: Follow conventions of Standard Written English. 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards. Selection of Industry and Cyber Issues Throughout this project, you will assume the perspective from an organization in a particular industry. In order to prepare your perspective, you will complete the following: Select a specific industry from one of the following areas: health care, finance, telecommunications, automotive, or retail upon which you will focus your oral statement. For example, you may choose to research the industry of grocery stores (retail) or hospitals (health care). Do not select a specific company; focus on the industry. Research and write a short paragraph about the cybersecurity issues you discover for your particular industry. Once you select your industry and identify its cyber issues, submit your findings to the discussion board to get feedback from your instructor. Project Practice - SIMTRAY Adius: Day 1 Before you begin to develop your oral statement, it is important to understand how laws and regulations can affect a particular industry. Begin by exploring the SIMTRAY titled, " Adius: Find Your Way in Three Days (https://coursecontent.umgc.edu/umgc/cit/cmp/cmp620/Adius-Find-Your-Way-in-Three- Days/index.html) ." SIMTRAY is a simulation that presents you with scenarios that will provide insight into the origins of issues affected by major regulatory/legal concerns facing every organization or industry. While this simulation focuses specifically on the financial industry, you will find that this exercise will help you examine the regulatory concerns for your chosen industry. Some of the issues and topics addressed in this exercise include cybersecurity policies (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218- cmp620/learning-topic-list/cybersecurity-policies.html?ou=771044) , countermeasures (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic- list/countermeasures.html?ou=771044) , SQL injection, digital evidence (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/digital- Competencies
8/6/23, 6 : 56 PM Print Pages Page 3 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined evidence.html?ou=771044) , cyberattacks and cyberthreats (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cyberattacks- and-cyberthreats.html?ou=771044) , mobile technologies (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/mobile- technologies.html?ou=771044) , outsourcing - security threats, cloud computing (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cloud- computing.html?ou=771044) , and the Gramm-Leach-Bliley Act (GLBA) (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/gramm-leach- bliley-act--glba-.html?ou=771044) . The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation. Project Practice - SIMTRAY Adius: Day 2 In the previous step, you started to examine the SIMTRAY, " Adius: Find Your Way in Three Days (https://coursecontent.umgc.edu/umgc/cit/cmp/cmp620/Adius-Find-Your-Way-in-Three- Days/index.html) ." In this step, continue to focus on SIMTRAY, but document the specific type of regulatory issues you encounter in your scenario since these same issues may be relevant to the industry you chose to examine for your oral presentation. Some of the issues and topics addressed in this exercise include cybersecurity policies (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218- cmp620/learning-topic-list/cybersecurity-policies.html?ou=771044) , countermeasures (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic- list/countermeasures.html?ou=771044) , SQL injection, digital evidence (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/digital- evidence.html?ou=771044) , cyberattacks and cyberthreats (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cyberattacks- and-cyberthreats.html?ou=771044) , mobile technologies (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/mobile- technologies.html?ou=771044) , outsourcing - security threats, cloud computing (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cloud- computing.html?ou=771044) , and the Gramm-Leach-Bliley Act (GLBA) (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/gramm-leach- bliley-act--glba-.html?ou=771044) . The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation. Project Practice - SIMTRAY Adius: Day 3 In this step, you should continue to explore the scenarios within the SIMTRAY, " Adius: Find Your Way in Three Days (https://coursecontent.umgc.edu/umgc/cit/cmp/cmp620/Adius-Find-Your-Way-in-Three- Days/index.html) ." If you have not already, you will most likely encounter the following topics in this
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
8/6/23, 6 : 56 PM Print Pages Page 4 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined exercise: cybersecurity policies, countermeasures (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic- list/countermeasures.html?ou=771044) , SQL injection, digital evidence (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/digital- evidence.html?ou=771044) , cyberattacks and cyberthreats (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cyberattacks- and-cyberthreats.html?ou=771044) , mobile technologies (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/mobile- technologies.html?ou=771044) , outsourcing - security threats, cloud computing (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/cloud- computing.html?ou=771044) , and the Gramm-Leach-Bliley Act (GLBA) (https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp620/learning-topic-list/gramm-leach- bliley-act--glba-.html?ou=771044) . Document events that you experience in the exercise that might affect the following industries: health care finance telecommunications automotive retail Think about how these issues will be affected by proposed regulation and begin to explore how you might be able to influence agencies to formulate appropriate standards favorable to a particular industry. The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned, and documented industry issues into a one-page report. Submit your report for feedback. Submit your assignment to your instructor for review and feedback. Follow these steps to access the assignment: Click My Tools in the top navigation bar. Click Assignments. Select the relevant assignment. Assess Industry Cyber Posture and Create a Relevant Standard Take Action
8/6/23, 6 : 56 PM Print Pages Page 5 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined Now that you have chosen your industry and you are aware of the cyber issues affecting it, it is time to identify a standard to address one of the cyber issues you identified. For example, in response to the credit card fraud in the retail industry, the bank card industry adopted the chip and PIN standard for credit cards. Using feedback you received from your instructor in previous steps, create a cybersecurity standard relevant to your chosen industry. Refer to industry-specific regulations (https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/course-resource-list/industry-specific- regulations.html?ou=771044) for additional background on existing regulations. Create a relevant standard and write a one-page summary (https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/course-resource-list/one-page- summary.html?ou=771044) documenting the standard and evaluating the impact it would have on your selected issues and business operations in your industry. This summary will be included in your written comments in the following step. Submit your Standards Summary for feedback. Submit your assignment to your instructor for review and feedback. Follow these steps to access the assignment: Click My Tools in the top navigation bar. Click Assignments. Select the relevant assignment. Submit Written Comments Develop your final written comments for presentation at the next standards body meeting. These comments should be between two and three pages, and it should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulation/standard, etc. Update the Standards Summary from the previous step according to the feedback you received. Attach the Standards Summary to your written comments. (The Standards Summary should not be included in the length requirement of the written comments.) Submit your written comments. Take Action
8/6/23, 6 : 56 PM Print Pages Page 6 of 6 https://leocontent.umgc.edu/content/umuc/tgs/cmp/cmp620/2235/proj…here.print-pages.html ? ou=771044&courseAndSemesterOption=undefined Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self- check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title. 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. 1.6: Follow conventions of Standard Written English. 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks. 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards. Submit your assignment to your instructor for review and feedback. Follow these steps to access the assignment: Click My Tools in the top navigation bar. Click Assignments. Select the relevant assignment. © 2023 University of Maryland Global Campus All links to external sites were verified at the time of publication. UMGC is not responsible for the validity or integrity of information located at external sites. Check Your Evaluation Criteria Take Action
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help