CYBR61510.docx

Type: Individual Project

Unit:  Allocating Cybersecurity Resources

Due Date:  Wed,12/18/19

Grading Type: Numeric

Points Possible:  250

Points Earned: 

Deliverable Length:  Final draft of paper; 2–3 pages new content

View objectives for this assignment

Go To:

· Assignment Details

· Scenario

· Learning Materials

· Reading Assignment

My Work:

Online Deliverables:

· Submissions

Looking for tutoring? Go to Smarthinking

Collapse All | Expand All Collapse All | Expand All

Assignment Details

Assignment Description

Part 1 Tasks (Objectives from Weeks 1–4):

· Your Management Plan should include a final draft of your paper, with all sections from the previous weeks' IPs reviewed in final form to be sure they meet the criteria outlined in those weeks' assignments.

· The paper should be formatted in accordance with APA guidelines. 

· Grammar, spelling, punctuation, and format should be correct and professional.

· In addition, you should have incorporated updates to your paper as a result of feedback from both peer reviews and your instructor.

Part 2 Tasks (Objectives for Week 5): The following new content for the Unit 5 Individual Project should be added to the Cybersecurity Budgeting Priorities section of your final paper:

· Identifying the top 3 security sectors budgeted for the majority of resource allocation in your company or organization

· Explanation of why these 3 sectors where chosen; include which criteria were used in making this determination

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reading Assignment

· Antonucci: Chapters 5 & 10

· Olcott, J. (2017). Where should you be spending your cybersecurity budget? Retrieved from https://www.bitsighttech.com/blog/cybersecurity-spending

· TrendMicro. (2017). How to budget for cyber security in 2018. Retrieved from  https://blog.trendmicro.com/how-to-budget-for-cyber-security-in-2018/

Assignment Objectives

· Analyze core standards that organizations must apply to effectively guard against cybersecurity intrusions

· Determine appropriate resource allocations to securely operate and maintain organizational cybersecurity requirements.

· Interpret an organization’s cybersecurity Incident Response (IR) plan

· Outline an approach to implement security policy and security monitoring methods

Other Information

There is no additional information to display at this time.

Legend

· Extra Credit

· View Assignment Rubric