Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Budgeting for Cybersecurity
ASSIGNMENT #5
Budgeting for Cybersecurity
Prepare a two-page briefing paper (5 to 7 paragraphs) for the senior leadership and corporate board of the case study "company" which addresses planning (what do we need to do?), programming (how will we do it?), and budgeting (how will we pay for it?) processes for IT security program management.
1. Use the case study and enterprise architecture diagrams to identify five or more risks which require a financial investment. Financial investments should be categorized as: people investments, process investments, and/or technology investments.
2. Choose one of the four strategies for reducing the costs associated with responding to cyberattacks from the Rand report (A Framework for Programming and Budgeting for Cybersecurity):
· Minimize Exposure
· Neutralize Attacks
· Increase Resilience
· Accelerate Recovery
3. Discuss how your selected strategy (make it clear which strategy you selected) can be used in the planning (what do we need to do?) and programming (how will we do it?) phases of budget preparation to identify less costly solutions for implementing technical, operational, and management controls.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
- @
- 966 orders completed
- ANSWER
-
Tutor has posted answer for $20.00. See answer's preview
********************* *** Cybersecurity(Student’s ********************* Name) Budgeting *** ******************** to individuals companies *** under ******** ** grow *********** ** please *** shareholders ** ********* **** **** ** develop ******** **** proceed to satisfy *** ********* and **** ***** ********* happy *** ********* to ** ********** **** **** **** ** maintain ***** ********** ************* **** security ********* such as ***** ******* **** ********* are ** *** ********* of ********** ******** ***** ** ********* *** *** ****** *** *********** ************ and ***** ********** lose ********* ** *** ******** ** ******* and ***** ******* To **** the company’s assets secure ** *** ** ********* *********** *** ********* ** the ******** risks **** expose it ** ********** ******* is expected ** invest **** ** its ******* **** *** ********* and ********** **** ** *** ****** risks ******* *** ******* ** * ***** security ****** ***** *** company *** ** ********** *** **** and get ********* ** ****** with ** (Davis ** ** 2016) Additionally ***** is * ******** ** mistake ********** **** cyber ******** ***** ******* ***** to integrate * precise ***** ** ******** ** protect the ******* against cyber threats **** ** *** ***** **** demand ****** *********** include *** ***** factor ***** *** ***** ********* **** ** ********* who *** ****** *** ******** ** their access ***** *** *** ********* (Davis et ** 2016) **** *** **** ** information ******** ******** **** make the employees less ******* ** *** ******** ******* The ***** risk ** ***** technology ********** ** *** aging ************** ***** *** ** ********** ** the ******** risksWith *** ******* ******* ** cyber ******* the ******* *** to **** ** **** a ******** **** **** ***** *** ***** while ******* **** ***** ******* ******** *********** resilience ** the **** ****** ** *** ******* ******* environment ******* ** ** ***** **** the ******* ******* on ***** ********** ** ** *********** ******** the ******** outcome ** *** ***** ******* **** approach ***** ******** the ********* ** *** ******* ** the ********* ******* *** ************ *** ***** ** ** ********* *** ********* measures **** ******** risk ** *** ************ (Aoyama et al 2015) Among the *********** resilience ** *** ***** ************ ***** *** *********** project ******* and ********** ******* ****** on ******** ********* **** ***** **** denial ** ******* **** ***** attacks *** ******* ***** depend ** the *********** **** *** internet ******** ********* **** ** telecoms ****** to ****** *** catch **** recognize ******* and ***** extra bandwidthOn creating cyber ********** ** *** business the best defense ** ***** proactive ***** ****************** ************** ********* ***** *** best way ** ***** ***** ********** ***** ****** **** **** ******* ** to ******* *** and ***** the ******* *** many years ships *** ***** **** **** *********** with ********* which ****** compartments ** *** body ** *** **** to keep ** ****** ***** ******* an ******* In this **** cyber ****** is the ******* *** the end **** *** be trained on *** ** ****** ******** ******* and attacks ************ *** ******* *** prepare *** * ***** ****** ** ************ the ******* ******* ************** where ** *** ******* ******* ************ **** *** contain the ***** or ********* *** *** ******** ********* ***** ** **** *** the ******** *** recovery will be ********* ***** **** ** the ******* *** from *** ***** ******** *** ******** conclusion the company ***** ** ****** more in *** ******* **** *** technology *** personnel **** ***** ** ** evident **** *** ******** *** ** **** up with * ******** **** will minimize *** costs ***** handling the ***** ******* ** **** *** the ******* *** **** *** ****** secure by ************* *** ********* ** *** ******** risks **** ****** ** ** *************************** * et ** ***** **** ******** resilient ***** ******** ********** **** *********** cyber security training: ********* ********** ****** **** 10th Asian (pp 1-4) IEEEBenaroch * ****** **** Opportunities Models *** ********* ******************** *********** and ************ in ************* ********** ******************** * * ** ** (2016)A ********* *** *********** and ********* for ***** ******** **** *********** ***** ****** United ********