Hi, I'll be happy to help with this
when do you need it by?
and how long does it need to be?
i need it by next Friday. it needs to be a 3 pages case study. i would like for you to use letter B in the project and i would like for it to be on Klingbeil, L., & Wark, T. (2008). A wireless sensor network for real-time indoor localisation and motion monitoring. Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, 39–50. doi: 10.1109/IPSN.2008.15 which is from the CISO’s emerging technologies reading list
Just going to send this through shortly
Here is the file
http://wikisend.com/download/308654/Emerging Technologies Case Study.docx
alternative link is here
Steve are you on line
Congratulations! You have just been hired by a major security consulting firm that has recently won several contracts to support chief information security officers (CISOs) in the Washington, DC, area. As part of your first consulting assignment, you have been asked to research and write a short case study (three pages) in which you discuss the legal environment (i.e., policies, regulations, and laws) and its impact upon how an organization (e.g., business, government agency, nonprofit) ensures the confidentiality, integrity, and availability of information and information systems. You have one week to complete your assignment.
The immediate audience for your case study is a group of senior managers (stakeholders) in a client organization who are not familiar with information security laws and practices. These managers need a brief overview of the legal environment to assist them in reviewing and commenting upon a new governance policy for their organization’s information security program. Your case study should be general enough, however, that it can be reused with other clients.
Your supervisor has also given you a “heads up” about a trap that previous consultants have missed when completing similar work for other clients: the term policy has two meanings that you must address: (a) government policies (e.g., those issued by federal, state, local, or tribal governments) and (b) organizational policies (e.g., those written to guide an organization’s compliance with laws, regulations, and policies).
Remember to cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.
Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology (NIST):
Video Transcript (Courtesy of NIST)
Source: National Institute of Standards and Technology (Creator). (2009, September 30). Information technology security for small businesses [Video]. Retrieved from http://csrc.nist.gov/groups/SMA/sbc/library.html#04.
Then write an information security white paper that can be used to market your firm’s security consulting services to small businesses in the Washington, DC, area. Your white paper must:
Be concise—no more than three pages long.
Provide a general explanation of the business need for information security (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company’s reputation, costs of litigation, etc.).
Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software.
Explain the following key concepts as part of the threats and vulnerabilities discussion:
Recommend technologies, processes, and policies that can be used to solve or mitigate one of the following common information security threats:
Discuss the impact or results that can be expected:
Remember to present your white paper and cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.
by friday will be good
Steve are you online
Steve, this next project is a group project. when i send you the description of this project, i only have to do two parts of the project. i am doing the project on Equifax credit company. the two parts i have to do is Physical Security Management and Network Security Management. i only have to do either a half page or one page of each one and i also have to do a PowerPoint of those to subjects. after i send you this message i will send the description. i need this by Tuesday if possible. if you have any question let me know.
Your security consulting firm has been retained by an insurance company to help it develop and implement a risk reduction program for companies purchasing cybersecurity liability insurance. The next task on this multi-year contract is to develop a set of program plans for organization-level information security programs for small businesses (i.e., up to 100 employees, no more than five offices / work locations). These documents must be tailored to specific industries and, due to the high percentage of Internet-based businesses seeking cybersecurity insurance, must address state, federal, and international laws, regulations, and standards.
To begin this assignment, your team (group) must select one industry or business type from the list below, which links out to the U.S. Small Business Administration website, http://www.sba.gov. (If you wish to use an industry or business type not in this list you must first obtain permission from your instructor.)
Consumer Goods & Services
Housing & Real Estate
Marketing and Social Media
Pharmaceuticals & Biotechnology
Telecommunications & Media
Transportation & Logistics
Next, read Information Security Program Background Information and Concepts.
Investigate how businesses in your selected industry use information technology to do business. Research your industry using the UMUC library and the Internet. As a starting point use the business guides found at http://www.sba.gov/category/navigation-structure/starting-managing-business/managing-business/business-guides-industry.
As a team, complete the information security program requirements gathering and analysis exercise using the provided worksheet.
Finally, each team (group) is to write and submit a five- to eight-page organization-level information security program plan, tailored to your chosen industry or type of business, using information from your completed worksheet. Use the outline provided below as a guide for writing your program plan. Organization-level information security program plans describe/specify the required organization and management structures (people and processes) as well as the technologies used to implement required information security protections and countermeasures.
A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. The client recently read a front-page story about a negligence lawsuit arising out of a data leak that exposed confidential client information. The source of the data leak was a peer-to-peer file sharing application that had been installed on an employee’s desktop computer. An initial quick-look security assessment found that your client’s concerns were well founded. At least one department (Marketing) was using a similar peer-to-peer file-sharing application to distribute promotional videos and audio podcasts to potential customers. Your team leader has asked you to prepare a short technology evaluation paper (deliverable) in which you address one of the problem areas (a or b) identified in the quick-look assessment:
Data: Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).
Software: Identify and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops (loss of system integrity).
Use the provided matrix to categorize and assess the risks associated with your chosen option (a or b). Then research and evaluate three or more technology-based solutions that could provide effective protection measures. Use one row per technology solution.
Your technology evaluation paper must begin with an executive summary followed by your technology evaluation matrix. The executive summary should provide an overview of your risk assessment and evaluation. It should also provide additional information to help the client understand your recommended solution. Your summary should be concise—approximately three pages long—and include the following elements:
an explanation of the information security threats (risks) and vulnerabilities (in plain English) associated with your selected option (a or b)
a comparison (compare/contrast) of the capabilities and weaknesses of the candidate technology-based solutions
a recommendation of the best fit technology-based solution to solve/mitigate the problem(s) associated with your selected option
Remember to present your findings and cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.
Can you please do letter B and can you please fill out the Matrix that is dealing with the project. i need it by Friday if possible, if not Monday is good. Thank you.
Steve, I tried to put it in as a new question, but the question is to long and all the question will not fit in the box that is provided. I need this answer by March 1,2013
I put the GDI Security Policy in the question box with your name in the subject.