FP Complete – CYB 570 – lustrate the importance of measuring gaps between current risk posture and target risk posture in cybersecurity

OVERVIEW

The purpose of this final project is to determine and illustrate the importance of measuring gaps between current risk posture and target risk posture. In this project, you will perform a cyber risk assessment by using an assessment tool for a specific organization.
Please select from the following:
  1. If you are a student currently working in the field, you may select your own organization or a previous organization to use for this final project.
  2. If you are a student not currently working in the field and/or may not have exposure/familiarity with an organization, please select a fictitious organization. The organization (or department) size should be from 50 to 200 people.
Below are the detailed instructions on how to perform the cyber risk assessment for this project, but in general, you must have all of the necessary information to evaluate different cyber aspects of your organization. You should come up with this information on your own, but remember the goal of using the tool is to learn about the cyber assessment process, not the complete accuracy of your estimate.
Course objectives covered in this project include CO 1, CO 2, CO 3, CO 4, CO 5, CO 6, CO 7
————————————————————————————————
INSTRUCTIONS
The final project should be a total of 8 to 10 pages (2000 to 2750 words) in APA format using an appropriate number of internal and external sources. Follow the instructions below.
  1. Write 2 to 3 pages introducing your organization or a fictitious organization. Describe the mission/business and the goal of performing a cyber risk assessment.
  2. Download and read the BSD ISO Cybersecurity Assessment Tool User Guide.
  3. Assess the cyber risk of your organization or fictitious organization. To do this, download the BSD ISO Cybersecurity Assessment Tool and complete the survey questions. Relying on your previous experience or inputs that would make sense, fill out the Excel tables and answer the questions in the tables. Be sure to refer to the following document for further information and assistance using the Cybersecurity Assessment Tool and this tool: Using the Cybersecurity Assessment Tool (CSAT).
  4. Based on your results from using the Cybersecurity Assessment Tool, identify and analyze the current cybersecurity-related gaps within the organization. Provide recommendations to improve the current risk posture of your organization. Write about these results and discuss the current gaps (along with recommendations) in 6 to 7 pages (1500 to 1750 words). These recommendations should be based on your current practices in the field and concepts you have studied.
————–
LINKS FOR ASSINGMENT: https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/https://security.bsd.uchicago.edu/cyber-security-assessment-tool-csat/

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.