The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
PLEASE I AM SUBMITTING THIS ASSIGNMENT ON TURNTIN. I HAVE ALSO ATTACHED ADDITIONAL INSTRUCTIONS BELOW.
You recently joined a small start-up company that has developed a suite of cybersecurity products that integrate network sensors (hardware) with big data analytics (software) to provide advanced threat detection at an affordable price. As is often the case with small companies, you are expected to lend your hand to whatever task needs doing. Yesterday, you were helping to write the online product brochures and other marketing materials. Today, your tasks include adding the North American Industry Classification System (NAICS) code(s) for the “cybersecurity” industry to the company’s Website. As you delve into the matter, you quickly discover that there is no NAICS code for a “cybersecurity” industry (see http://www.census.gov/cgi-bin/sssd/naics/naicsrch?chart=2012). After additional research, you learned that the NAICS codes for your company’s direct competitors (companies selling similar cybersecurity products) included the following:
· Computer and Electronic Product Manufacturing (NAICS prefix “334”)
o Computer Terminal and Other Computer Peripheral Equipment Manufacturing
o Computer Storage Device Manufacturing
· Information Industry (NAICS prefix “51”)
o Custom Computer Programming Services
o Software Publishers
· Professional, Scientific, and Technical Services Industry (NAICS prefix “54”)
o Computer Systems Design Services
o Electronic Stores
· Retail Trade (NAICS prefix “44”)
o Electronic Stores
CSIA 310: Cybersecurity Processes & TechnologiesCase Study #3: Technology & Product Review for Identity Governance & AdministrationCase Scenario:North-by-East Sofware is a small but growing sofware development company. A recentlycompleted risk assessment Found that the company had very weak controls over the issuance andmanagement oF user ID’s and privileged accounts. The risk assessment recommended that the companyimplement two key controls to mi±gate insider threats: least privilege and separa±on oF du±es. The riskassessment also highlighted the poten±al ²nancial losses which could occur due to thef or disclosure oFthe company’s strategic plans and intellectual property. The company’s ChieF InForma±on O³cer hasrecommended that an Iden±ty Governance and Administra±on (IGA) product be purchased to helpimplement the required security controls.As a member oF the CIO’s team, you have been tasked toresearch,review, and recommend anIGA product which, at a minimum, will meet the company’s primary needs (controlling access,implemen±ng least privilege, and ensuring separa±on of du±es).Your product review and evalua±onshould include addi±onal relevant Features and characteris±cs which could help the company addressand manage risks associated with insider threats.Research:1.Review the Week 5 readings2.Choose an Iden±ty Management or Iden±ty Governance & Administra±on product which wasmen±oned in the readings. Research your chosen product using the vendor’s website andproduct inForma±on brochures.3.´ind three or more addi±onal sources which provide reviews For (a) your chosen product or (b)general inForma±on about the characteris±cs oF Iden±ty Governance & Administra±on. Products.Write:Write a 3 page summary oF your research. At a minimum, your summary must include theFollowing:1.An introduc±on or overview For the security technology category (Iden±ty Governance &Administra±on).2.A review oF the Features, capabili±es, and de²ciencies For your selected vendor and product.3.Discussion oF how the selected product could be used by your client to support itscybersecurity objec±ves by reducing risk, increasing resistance to threats/aµacks, decreasingvulnerabili±es, etc.As you write your review, make sure that you address security issues using standardcybersecurity terminology (e.g. 5 Pillars IA, 5 Pillars InForma±on Security, “governance,” etc.). See theresources listed under Week 1 and under Course Resources > Cybersecurity Concepts Review Forde²ni±ons and terminology.Copyright ©2016 by University oF Maryland University College. All Rights Reserved
Attachments:
-----------