SlideShare a Scribd company logo
INTRODUCTION Throughout your career in cybersecurity management,
you will be ask
INTRODUCTIONThroughout your career in cybersecurity management, you will be asked to
develop and improve an IT department to support a company’s strategic goals and mission.
Assessments of the organization’s cybersecurity posture will need to be conducted to secure
the company’s information and systems. The organization’s leadership may decide to hire
external consultants to do this assessment. The consultants will review the security policies,
standards, procedures, and guidelines that are used to secure the company’s assets.
Additionally, they will look at compliance issues, personnel roles and assignments,
continuity plans, and overall risk management.In this task, you will analyze an independent
assessment and respond to it in a detailed written report. You will need to read the attached
“Company Overview” and “Independent Security Report” that correspond with the
following scenario.SCENARIOPsinuvia Incorporated is a medical supply company
specializing in wearable and implantable medical devices. Its chief scientist recently left the
organization and returned to St. Petersburg, Russia. During a recent board meeting, the
discussion centered on how the company can improve its operations and secure its
information and information systems. Board members focused on the possibility of an
internal threat from the recently departed chief scientist and the possibility of external
threats. As a result of this meeting, the board decided to have an independent assessment of
the cybersecurity posture of the company. The assessment was completed by Autojor
Security Consultants. This organization uncovered a number of issues with Psinuvia’s
security program and sent a security report detailing what was found. (See the
“Independent Security Report” in the attachments.)As Psinuvia Inc.’s chief technology
officer (CTO), you act as the leader of the cybersecurity department. You are required to
review the report and write Psinuvia’s response to the proposed security improvements.
You must determine the appropriate actions to take, resulting in a plan for fixing the
revealed issues. Your response must be in a written report outlining the ways Psinuvia will
improve security. This report will be given to the board of directors and upper
management, including the chief executive officer (CEO).REQUIREMENTSYour submission
must be your original work. No more than a combined total of 30% of a submission and no
more than a 10% match to any one individual source can be directly quoted or closely
paraphrased from sources, even if cited correctly. An originality report is provided when
you submit your task that can be used as a guide.You must use the rubric to direct the
creation of your submission because it provides detailed criteria that will be used to
evaluate your work. Each requirement below may be evaluated by more than one rubric
aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.A.
Describe both the physical vulnerabilities and physical threats that put the security posture
of Psinuvia Inc. at risk. Provide details from the attached “Independent Security Report,”
including how each vulnerability or threat is negatively impacting the security posture of
the company.B. Describe both the logical vulnerabilities and logical threats that put the
security posture of Psinuvia Inc. at risk. Provide details from the attached “Independent
Security Report,” including how each vulnerability or threat is negatively impacting the
security posture of the company.C. Summarize industry standards for securing
organizational assets regarding policies for acceptable use, mobile devices, passwords, and
personally identifiable information (PII), using industry-respected sources to support your
claims.D. List the IT department duties that belong in the Compliance and Risk
Department and the Security Department, as described in part six of the attached
“Independent Security Report,” by organizing them into a chart or table.E. Develop a PCI
DSS-compliant policy to address the concerns in the “Independent Security Report,”
including the roles and responsibilities of each component of the policy.F. Propose
methods for bringing Psinuvia Inc. into compliance with General Data Protection Regulation
(GDPR) requirements, including specific examples for how each method will address
international regulations.G. Identify the HIPAA provisions Psinuvia Inc. needs to address,
including the associated consequences for continued noncompliance.H. Develop a business
continuity plan to address the natural disaster described in part four of the “Independent
Security Report.” CISSP best practice should inform execution and maintenance of mission
critical tasks in the business continuity plan for Psinuvia Inc.I. Acknowledge sources, using
in-text citations and references, for content that is quoted, paraphrased, or summarized.J.
Demonstrate professional communication in the content and presentation of your
submission.RUBRICA:PHYSICAL VULNERABILITIES AND THREATSNOT EVIDENTThe
submission does not describe both physical vulnerabilities and physical
threats.APPROACHING COMPETENCEThe submission describes both physical
vulnerabilities and physical threats, but the information provided contains errors, or it does
not include details for how each vulnerability or threat is negatively impacting the security
posture of the company, or the information provided contains errors or is not based on the
“Independent Security Report.”COMPETENTThe submission describes both the physical
vulnerabilities and physical threats that put the security posture of Psinuvia Inc. at risk. The
submission provides details from the attached “Independent Security Report” and includes
details for how each vulnerability or threat is negatively impacting the security posture of
the company.B:LOGICAL VULNERABILITIES AND THREATSNOT EVIDENTThe submission
does not describe both logical vulnerabilities and logical threats.APPROACHING
COMPETENCEThe submission describes both logical vulnerabilities and logical threats, but
the information provided contains errors, or it does not include details for how each
vulnerability or threat is negatively impacting the security posture of the company, or the
information provided contains errors or is not based on the “Independent Security
Report.”COMPETENTThe submission describes both the logical vulnerabilities and logical
threats that put the security posture of Psinuvia Inc. at risk. The submission provides details
from the attached “Independent Security Report” and includes details for how each
vulnerability or threat is negatively impacting the security posture of the
company.C:POLICIESNOT EVIDENTThe submission does not summarize policies for
acceptable use, mobile devices, passwords, and PII.APPROACHING COMPETENCEThe
submission summarizes policies for acceptable use, mobile devices, passwords, and PII, but
the policies are not industry standard for securing organizational assets. Or the summary
does not provide industry-respected sources to support the claim, or the information
provided contains errors.COMPETENTThe submission accurately summarizes industry
standards for securing organizational assets regarding policies for acceptable use, mobile
devices, passwords, and PII, using industry-respected sources to support the
claims.D:FUNCTIONAL AREASNOT EVIDENTThe submission does not list duties in both
functional areas.APPROACHING COMPETENCEThe submission lists the duties belonging in
both functional areas, but the information provided contains errors or is not organized in a
chart or table.COMPETENTThe submission accurately lists the duties belonging in both
functional areas. The information is organized into a chart or table.E:PCI DSS POLICYNOT
EVIDENTThe submission does not provide a policy.APPROACHING COMPETENCEThe
submission develops a policy, but it is notPCI DSS compliant, or each of the concerns in the
“Independent Security Report” are not addressed. Or the roles and responsibilities are not
included for each component of the adapted PCI DSS policy, or the information provided
contains errors.COMPETENTThe submission develops a PCI DSS–compliant policy that
addresses each of the concerns in the “Independent Security Report.” Roles and
responsibilities are accurate for each component of the adapted PCI DSS policy.F:GDPR
COMPLIANCENOT EVIDENTThe submission does not propose methods for bringing
Psinuvia Inc. into compliance with GDPR requirements.APPROACHING COMPETENCEThe
submission proposes methods for bringing Psinuvia Inc. into compliance with GDPR
requirements, but it does not provide specific examples of how each method will address
international regulations, or the submission contains errors.COMPETENTThe submission
proposes methods for bringing Psinuvia Inc. into compliance with GDPR requirements.
Specific examples are provided for how each method will address international
regulations.G:HIPAA COMPLIANCENOT EVIDENTThe submission does not identify HIPAA
provisions.APPROACHING COMPETENCEThe submission identifies HIPAA provisions, but
the information provided does not address all applicable provisions for Psinuvia Inc., does
not include the associated consequences for noncompliance, or contains
errors.COMPETENTThe submission accurately identifies all applicable HIPAA provisions for
Psinuvia Inc. and includes the associated consequences for noncompliance.H:BUSINESS
CONTINUITYNOT EVIDENTThe submission does not develop a business continuity
plan.APPROACHING COMPETENCEThe submission develops a business continuity plan but
does not address the natural disaster described in part four of the “Independent Security
Report” or does not use CISSP best practice to inform the execution and maintenance of
mission critical tasks in the business continuity plan for Psinuvia Inc. Or the submission
contains inaccuracies.COMPETENTThe submission develops a business continuity plan that
addresses the natural disaster described in part four of the “Independent Security Report.”
CISSP best practice informs the execution and maintenance of mission critical tasks in the
business continuity plan for Psinuvia Inc.I:SOURCESNOT EVIDENTThe submission does not
include both in-text citations and a reference list for sources that are quoted, paraphrased,
or summarized.APPROACHING COMPETENCEThe submission includes in-text citations for
sources that are quoted, paraphrased, or summarized and a reference list; however, the
citations or reference list is incomplete or inaccurate.COMPETENTThe submission includes
in-text citations for sources that are properly quoted, paraphrased, or summarized and a
reference list that accurately identifies the author, date, title, and source location as
available. Or the candidate does not use sources.J:PROFESSIONAL COMMUNICATIONNOT
EVIDENTContent is unstructured, is disjointed, or contains pervasive errors in mechanics,
usage, or grammar. Vocabulary or tone is unprofessional or distracts from the
topic.APPROACHING COMPETENCEContent is poorly organized, is difficult to follow, or
contains errors in mechanics, usage, or grammar that cause confusion. Terminology is
misused or ineffective.COMPETENTContent reflects attention to detail, is organized, and
focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology
is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics,
usage, and grammar promote accurate interpretation and understanding.** Cited Sources
must include: the included ISR, PCI DSS, GDPR, and HIPAAAPA but no abstract, please

More Related Content

Similar to INTRODUCTION Throughout your career in cybersecurity you will be ask.docx

Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
AISHA232980
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
Davis12a
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
donaldzs9
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
DavisMurphyA98
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
Josef Sulca Cueva
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
briancrawford30935
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
McdonaldRyan80
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
Tieu Luu
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
Bradley Susser
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
mfmurat
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
kopiko146
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
jonhson199
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
CPaschal
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
chrysanthemu49
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
PYA, P.C.
 

Similar to INTRODUCTION Throughout your career in cybersecurity you will be ask.docx (20)

Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Ffiec cat may_2017
Ffiec cat may_2017Ffiec cat may_2017
Ffiec cat may_2017
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 

More from 4934bk

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
4934bk
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
4934bk
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
4934bk
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
4934bk
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
4934bk
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
4934bk
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
4934bk
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
4934bk
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
4934bk
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
4934bk
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
4934bk
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
4934bk
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
4934bk
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
4934bk
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
4934bk
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
4934bk
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
4934bk
 
What.docx
What.docxWhat.docx
What.docx
4934bk
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
4934bk
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
4934bk
 

More from 4934bk (20)

You are the information technology manager of an.docx
You are the information technology manager of an.docxYou are the information technology manager of an.docx
You are the information technology manager of an.docx
 
Your parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docxYour parents gave you up for adoption at a.docx
Your parents gave you up for adoption at a.docx
 
Writing in the social sciences.docx
Writing in the social sciences.docxWriting in the social sciences.docx
Writing in the social sciences.docx
 
to questions.docx
to questions.docxto questions.docx
to questions.docx
 
Write an essay on the colonial.docx
Write an essay on the colonial.docxWrite an essay on the colonial.docx
Write an essay on the colonial.docx
 
Write about interactions in the premodern world.docx
Write about interactions in the premodern world.docxWrite about interactions in the premodern world.docx
Write about interactions in the premodern world.docx
 
Write about Frontline Video or.docx
Write about Frontline Video or.docxWrite about Frontline Video or.docx
Write about Frontline Video or.docx
 
World War II.docx
World War II.docxWorld War II.docx
World War II.docx
 
work and Chicano.docx
work and Chicano.docxwork and Chicano.docx
work and Chicano.docx
 
Write a literary essay based on the.docx
Write a literary essay based on the.docxWrite a literary essay based on the.docx
Write a literary essay based on the.docx
 
Why are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docxWhy are the ancient legends of China of interest to.docx
Why are the ancient legends of China of interest to.docx
 
Why and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docxWhy and how did the loom large in focus on.docx
Why and how did the loom large in focus on.docx
 
Why did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docxWhy did the Roman Catholic Church consider the sin of.docx
Why did the Roman Catholic Church consider the sin of.docx
 
Why and how did the loom large in.docx
Why and how did the loom large in.docxWhy and how did the loom large in.docx
Why and how did the loom large in.docx
 
What similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docxWhat similarities do you notice between organizations for the.docx
What similarities do you notice between organizations for the.docx
 
Who invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docxWho invented the printing and how did it have an.docx
Who invented the printing and how did it have an.docx
 
Which is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docxWhich is the true statement regarding the criteria for prioritizing.docx
Which is the true statement regarding the criteria for prioritizing.docx
 
What.docx
What.docxWhat.docx
What.docx
 
What was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docxWhat was the threat posed to western style democracy in.docx
What was the threat posed to western style democracy in.docx
 
What stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docxWhat stereotypes did Catholics have of Protestants and Protestants of.docx
What stereotypes did Catholics have of Protestants and Protestants of.docx
 

Recently uploaded

คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

INTRODUCTION Throughout your career in cybersecurity you will be ask.docx

  • 1. INTRODUCTION Throughout your career in cybersecurity management, you will be ask INTRODUCTIONThroughout your career in cybersecurity management, you will be asked to develop and improve an IT department to support a company’s strategic goals and mission. Assessments of the organization’s cybersecurity posture will need to be conducted to secure the company’s information and systems. The organization’s leadership may decide to hire external consultants to do this assessment. The consultants will review the security policies, standards, procedures, and guidelines that are used to secure the company’s assets. Additionally, they will look at compliance issues, personnel roles and assignments, continuity plans, and overall risk management.In this task, you will analyze an independent assessment and respond to it in a detailed written report. You will need to read the attached “Company Overview” and “Independent Security Report” that correspond with the following scenario.SCENARIOPsinuvia Incorporated is a medical supply company specializing in wearable and implantable medical devices. Its chief scientist recently left the organization and returned to St. Petersburg, Russia. During a recent board meeting, the discussion centered on how the company can improve its operations and secure its information and information systems. Board members focused on the possibility of an internal threat from the recently departed chief scientist and the possibility of external threats. As a result of this meeting, the board decided to have an independent assessment of the cybersecurity posture of the company. The assessment was completed by Autojor Security Consultants. This organization uncovered a number of issues with Psinuvia’s security program and sent a security report detailing what was found. (See the “Independent Security Report” in the attachments.)As Psinuvia Inc.’s chief technology officer (CTO), you act as the leader of the cybersecurity department. You are required to review the report and write Psinuvia’s response to the proposed security improvements. You must determine the appropriate actions to take, resulting in a plan for fixing the revealed issues. Your response must be in a written report outlining the ways Psinuvia will improve security. This report will be given to the board of directors and upper management, including the chief executive officer (CEO).REQUIREMENTSYour submission must be your original work. No more than a combined total of 30% of a submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.You must use the rubric to direct the
  • 2. creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.A. Describe both the physical vulnerabilities and physical threats that put the security posture of Psinuvia Inc. at risk. Provide details from the attached “Independent Security Report,” including how each vulnerability or threat is negatively impacting the security posture of the company.B. Describe both the logical vulnerabilities and logical threats that put the security posture of Psinuvia Inc. at risk. Provide details from the attached “Independent Security Report,” including how each vulnerability or threat is negatively impacting the security posture of the company.C. Summarize industry standards for securing organizational assets regarding policies for acceptable use, mobile devices, passwords, and personally identifiable information (PII), using industry-respected sources to support your claims.D. List the IT department duties that belong in the Compliance and Risk Department and the Security Department, as described in part six of the attached “Independent Security Report,” by organizing them into a chart or table.E. Develop a PCI DSS-compliant policy to address the concerns in the “Independent Security Report,” including the roles and responsibilities of each component of the policy.F. Propose methods for bringing Psinuvia Inc. into compliance with General Data Protection Regulation (GDPR) requirements, including specific examples for how each method will address international regulations.G. Identify the HIPAA provisions Psinuvia Inc. needs to address, including the associated consequences for continued noncompliance.H. Develop a business continuity plan to address the natural disaster described in part four of the “Independent Security Report.” CISSP best practice should inform execution and maintenance of mission critical tasks in the business continuity plan for Psinuvia Inc.I. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.J. Demonstrate professional communication in the content and presentation of your submission.RUBRICA:PHYSICAL VULNERABILITIES AND THREATSNOT EVIDENTThe submission does not describe both physical vulnerabilities and physical threats.APPROACHING COMPETENCEThe submission describes both physical vulnerabilities and physical threats, but the information provided contains errors, or it does not include details for how each vulnerability or threat is negatively impacting the security posture of the company, or the information provided contains errors or is not based on the “Independent Security Report.”COMPETENTThe submission describes both the physical vulnerabilities and physical threats that put the security posture of Psinuvia Inc. at risk. The submission provides details from the attached “Independent Security Report” and includes details for how each vulnerability or threat is negatively impacting the security posture of the company.B:LOGICAL VULNERABILITIES AND THREATSNOT EVIDENTThe submission does not describe both logical vulnerabilities and logical threats.APPROACHING COMPETENCEThe submission describes both logical vulnerabilities and logical threats, but the information provided contains errors, or it does not include details for how each vulnerability or threat is negatively impacting the security posture of the company, or the information provided contains errors or is not based on the “Independent Security Report.”COMPETENTThe submission describes both the logical vulnerabilities and logical
  • 3. threats that put the security posture of Psinuvia Inc. at risk. The submission provides details from the attached “Independent Security Report” and includes details for how each vulnerability or threat is negatively impacting the security posture of the company.C:POLICIESNOT EVIDENTThe submission does not summarize policies for acceptable use, mobile devices, passwords, and PII.APPROACHING COMPETENCEThe submission summarizes policies for acceptable use, mobile devices, passwords, and PII, but the policies are not industry standard for securing organizational assets. Or the summary does not provide industry-respected sources to support the claim, or the information provided contains errors.COMPETENTThe submission accurately summarizes industry standards for securing organizational assets regarding policies for acceptable use, mobile devices, passwords, and PII, using industry-respected sources to support the claims.D:FUNCTIONAL AREASNOT EVIDENTThe submission does not list duties in both functional areas.APPROACHING COMPETENCEThe submission lists the duties belonging in both functional areas, but the information provided contains errors or is not organized in a chart or table.COMPETENTThe submission accurately lists the duties belonging in both functional areas. The information is organized into a chart or table.E:PCI DSS POLICYNOT EVIDENTThe submission does not provide a policy.APPROACHING COMPETENCEThe submission develops a policy, but it is notPCI DSS compliant, or each of the concerns in the “Independent Security Report” are not addressed. Or the roles and responsibilities are not included for each component of the adapted PCI DSS policy, or the information provided contains errors.COMPETENTThe submission develops a PCI DSS–compliant policy that addresses each of the concerns in the “Independent Security Report.” Roles and responsibilities are accurate for each component of the adapted PCI DSS policy.F:GDPR COMPLIANCENOT EVIDENTThe submission does not propose methods for bringing Psinuvia Inc. into compliance with GDPR requirements.APPROACHING COMPETENCEThe submission proposes methods for bringing Psinuvia Inc. into compliance with GDPR requirements, but it does not provide specific examples of how each method will address international regulations, or the submission contains errors.COMPETENTThe submission proposes methods for bringing Psinuvia Inc. into compliance with GDPR requirements. Specific examples are provided for how each method will address international regulations.G:HIPAA COMPLIANCENOT EVIDENTThe submission does not identify HIPAA provisions.APPROACHING COMPETENCEThe submission identifies HIPAA provisions, but the information provided does not address all applicable provisions for Psinuvia Inc., does not include the associated consequences for noncompliance, or contains errors.COMPETENTThe submission accurately identifies all applicable HIPAA provisions for Psinuvia Inc. and includes the associated consequences for noncompliance.H:BUSINESS CONTINUITYNOT EVIDENTThe submission does not develop a business continuity plan.APPROACHING COMPETENCEThe submission develops a business continuity plan but does not address the natural disaster described in part four of the “Independent Security Report” or does not use CISSP best practice to inform the execution and maintenance of mission critical tasks in the business continuity plan for Psinuvia Inc. Or the submission contains inaccuracies.COMPETENTThe submission develops a business continuity plan that addresses the natural disaster described in part four of the “Independent Security Report.”
  • 4. CISSP best practice informs the execution and maintenance of mission critical tasks in the business continuity plan for Psinuvia Inc.I:SOURCESNOT EVIDENTThe submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.APPROACHING COMPETENCEThe submission includes in-text citations for sources that are quoted, paraphrased, or summarized and a reference list; however, the citations or reference list is incomplete or inaccurate.COMPETENTThe submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. Or the candidate does not use sources.J:PROFESSIONAL COMMUNICATIONNOT EVIDENTContent is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.APPROACHING COMPETENCEContent is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.COMPETENTContent reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.** Cited Sources must include: the included ISR, PCI DSS, GDPR, and HIPAAAPA but no abstract, please