Solved by Expert Tutors
CSIA 350: Cybersecurity in Business & Industry Case Study #1: Why should businesses invest in cybersecurity?
Solved by Expert Tutors
Question

<br/>Please help me with this paper.  I have attached both the directions

for it and the grading rubric.  Must be original.

CSIA 350: Cybersecurity in Business & Industry Case Study #1: Why should businesses invest in cybersecurity? Case Scenario: A client company has asked your cybersecurity consulTng frm to provide it with a 2 to 3 page white paper which discusses the business need For investments in cybersecurity. ±he purpose oF this white paper is to “fll in the gaps” in a business case that was already prepared by the company’s ChieF InFormaTon O²cer. ±he target audience For your paper is the company’s C-suite execuTves. ±hese execuTves will be meeTng later this month to discuss budget requests From department heads. ±he company has requested that your white paper use the same investment categories as are already in use For the CIO’s business case: people, processes, and technologies. Research: 1. Read / Review the Week 1 readings. 2. ³ind three or more addiTonal sources which provide inFormaTon about best pracTce recommendaTons For cybersecurity and other reasons why businesses should invest in people, processes, and technologies related to cybersecurity. ±hese addiTonal sources can include analyst reports (e.g. Gartner, ³orrester, Price-Waterhouse, Booz-Allen) and/or news stories about recent a´acks / threats, data breaches, cybercrime, cyber terrorism, etc. Write: Write a two to three page summary oF your research. At a minimum, your summary must include the Following: 1. An introducTon or overview oF cybersecurity which provides defniTons and addresses the business need For cybersecurity. ±his introducTon should be suitable For an execuTve audience. 2. A separate secTon which addresses ethical consideraTons which drive the business need For investments in cybersecurity. 3. A review oF best pracTces and recommendaTons which can be added to the exisTng business case to provide jusTfcaTon For cybersecurity-Focused investments in the three investment categories idenTfed by the company: people, processes, and technologies. Your white paper should use standard terms and defniTons For cybersecurity. See Course Content > Cybersecurity Concepts Review For recommended resources. Submit For Grading & Discussion 1. Submit your case study in MS Word Format (.docx or .doc fle) using the Case Study #1 Assignment in your assignment Folder. (A´ach the fle.) Copyright ©2015 by University oF Maryland University College. All Rights Reserved
Background image of page 1
CSIA 350: Cybersecurity in Business & Industry Formatting Instructions 1. Use standard APA formaTng for the MS Word document that you submit to your assignment folder. FormaTng requirements and examples are found under Course Resources > APA Resources. Additional Information 1. You are expected to write gramma±cally correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctua±on is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. ²hese items are graded under Professionalism and cons±tute 20% of the assignment grade. 2. You are expected to credit your sources using in-text cita±ons and reference list entries. Both your cita±ons and your reference list entries must comply with APA 6th edi±on Style requirements. Failure to credit your sources will result in penal±es as provided for under the university’s Academic Integrity policy. Copyright ©2015 by University of Maryland University College. All Rights Reserved
Background image of page 2
Rubric Name: Case Study #1 Rubric Criteria Excellent Outstanding Acceptable Needs Improveme nt Needs Significant Improveme nt Missing or Unacceptab le Introduction or Overview for the Case Study 20 points Provided an excellent overview of the case study which provided deFniTons for key terms and addressed the business need for cybersecurity. ±he overview appropriately used informaTon from 3 or more authoritaTve sources, i.e. journal arTcles, industry or trade publicaTons, news arTcles, industry or government white papers and authoritaTve Web sites. 18 points Provided an outstanding overview of the case study which provided deFniTons for key terms and addressed the business need for cybersecurity. ±he overview appropriately used informaTon from 2 or more authoritaTve sources, i.e. journal arTcles, industry or trade publicaTons, news arTcles, industry or government white papers and authoritaTve Web sites. 16 points Provided an overview of the case study which addressed the business need for cybersecurity. ±he overview appropriately used informaTon from authoritaTve sources, i.e. journal arTcles, industry or trade publicaTons, news arTcles, industry or government white papers and authoritaTve Web sites. 14 points Provided an overview but the secTon lacked important details about the case. InformaTon from authoritaTve sources was cited and used in the overview. 10 points A²empted to provide an introducTon to the case study but this secTon lacked detail and/or was not well supported by informaTon drawn from authoritaTve sources. 0 points ±he introducTon and/or overview secTons of the paper were o³ topic. Identified and Explained Ethical Considerations Impacting Cybersecurity Investment Decisions 20 points Provided an excellent discussion of 3 or more ethical consideraTons which drive the business need for investments 18 points Provided an outstanding discussion of 3 or more ethical consideraTons which drive the business need for investments 16 points Provided a discussion of at least 3 ethical consideraTons which drive the business need for investments in 14 points Provided a discussion of ethical consideraTons in the context of cybersecurity investments by 9 points Provided a discussion of ethics in the context of business decisions or cybersecurity. ±he discussion 0 points ±his secTon was missing, o³ topic, or failed to provide informaTon about ethical consideraTons
Background image of page 1
in cybersecurity. Discussion included: duty, social contract, and uTlitarianism. Appropriately used informaTon from 3 or more authoritaTve sources. in cybersecurity. Discussion included: duty, social contract, and uTlitarianism. Appropriately used informaTon from 3 or more authoritaTve sources. cybersecurity. Discussion included: duty, social contract, and uTlitarianism. Appropriately used informaTon from authoritaTve sources. a business. InformaTon from authoritaTve sources was cited and used. lacked detail and/or was not well supported by informaTon drawn from authoritaTve sources. for business investment decisions. Best Practices and Recommendati ons for Business Case for Cybersecurity Investments 20 points Provided an excellent discussion of 3 or more best pracTces (with recommendaTo ns) which could be added to an exisTng business case. RecommendaT ons provided an excellent jusTFcaTon of the business need for investments in cybersecurity. Appropriately used informaTon from 3 or more authoritaTve sources. 18 points Provided an outstanding discussion of 3 or more best pracTces (with recommendaTo ns) which could be added to an exisTng business case. RecommendaT ons provided an outstanding jusTFcaTon of the business need for investments in cybersecurity. Appropriately used informaTon from 3 or more authoritaTve sources. 16 points Provided a discussion best pracTces and recommendaT ons which could be added to an exisTng business case. RecommendaT ons provided a jusTFcaTon of the business need for investments in cybersecurity. ±he discussion was supported by informaTon drawn from authoritaTve sources. 14 points Discussion provided some informaTon about best pracTces and included recommendaT ons for investments in cybersecurity. MenToned informaTon obtained from authoritaTve sources. 9 points Included recommendaT ons for cybersecurity investments but the discussion lacked detail and/or was not well supported by informaTon from authoritaTve sources. 0 points ±his secTon was missing, o² topic, or failed to address best pracTces and/or recommendaT ons for investments in cybersecurity. Investment Categories: People, Processes, & Technologies 10 points Provided an excellent discussion of investments which was 8.5 points Provided an outstanding discussion of investments which was 7 points Provided a discussion of investments which was organized in 3 6 points Provided a discussion of investments which menToned 4 points Provided a discussion of investments which menToned at 0 points Did not menTon the three required investment
Background image of page 2
Show entire document
Sign up to view the entire interaction

Step-by-step answer

itur laoreet. Na

usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel

Cyber security i bu (1).docx
pulvinar tortor nec facilisis. Pellentesqu rem ipsum do Fusce dui l at, ultrices a trices ac magna sque dapibus efficitur laoreet. Nam risus ante, dapibus a mo m ipsum dolor sit amet, consectetu

Subscribe to view the full answer

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
Let our 24/7 Computer Science tutors help you get unstuck! Ask your first question.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes