Asked by dw3746
I would like to pay someone to assist me with my Capstone C796 at...
I would like to pay someone to assist me with my Capstone C796 at the western governor university. can someone assist?
Task 1
Cybersecurity Graduate Capstone Topic Approval Form
The purpose of this approval form is to help you clearly state your research question for this capstone project, as well as your project's scope and timeline, to ensure that these align with your degree emphasis. You will not have a complete and realistic overview of your project, and the acceptability of your project for the purposes of this course cannot be accurately assessed without clearly defining each of these areas. Many students use a project they have already completed within the past two years. If you choose a finished project, you will write the proposal as if the project is not yet complete. Then, when you report on your project, use your complete after-implementation report.
If you have not yet started your project, this document can help make sure the scope is in the acceptable range for this capstone. A course instructor must approve this form before you submit your capstone for evaluation. The task will not be evaluated without a course instructor's signature. The course instructor may ask for additional information before approving the form.
Student Name: Click here to enter text.
Student ID: Click here to enter text.
Capstone Project Name: Click here to enter text.
o This project does not involve human subjects research and is exempt from WGU IRB review.
Project Topic: Click here to enter text.
Summary of the problem: Click here to enter text.
Outline of technology-supported security solution: Click here to enter text.
Context: Explain why the situation or question would benefit from your security solution. Click here to enter text.
Stakeholders: Identify the project stakeholders. Click here to enter text.
Project Plan: Describe the project plan, scope, goals, and objectives. Click here to enter text.
Methodology: Outline the project approach. Click here to enter text.
Implementation Plan: Identify the project phases. Click here to enter text.
Project Outcomes: List the key anticipated project outcomes and deliverables in 500 words or less. Click here to enter text.
Projected Project End Date: Click here to enter a date.
Sources: Include an APA-style list for all references and citations that support the summaries above and are used in-text and as outside sources. Click here to enter text.
Task 2.
COMPETENCIES
981.1.1 : Capstone
The graduate integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional field.
INTRODUCTION
In this task, you will design, develop, and implement the capstone project approved by your course instructor.
You will compile the information for your solution into a report based on the prompts below.
Your work for this task will not be evaluated until the appropriate forms from Task 1 have been submitted and evaluated.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Write an executive report that includes the following requirements:
• the security problem under investigation
• background information about the problem
• a root cause analysis of the problem
• a description of the stakeholders
• an analysis of systems, processes, or both
• a description of the project requirements
• the data available or the data that needs to be collected to support the project
• the industry-standard methodology you used to guide and support the solution's design and development
• deliverables associated with the design and development of the technology solution
• the strategy for implementing the solution and anticipated outcomes from the project, including phases of the rollout, details of project launch, and training plan for users
• the quality assurance plan for the solution, including formative and summative evaluation plans and plans for revision
• assessment of risks associated with the implementation
• the technology environments, tools, and any related costs, as well as the human resources, that are necessary to execute each project phase
• a projected timeline, including milestones, start and end dates, duration for each milestone, dependencies, and resources assigned to each task
• the framework that will be used to assess the success of the project and assess if the security solution meets stakeholder's needs, including test cases and acceptance criteria
B. Design and develop a technology-supported security solution that addresses your identified business problem or organizational need.
1. Your solution must contribute to at least one of the following major security areas:
Cyberlaw, Regulations, and Compliance
Leadership and Professionalism
Security Planning and Management
Systems Security
2. Provide a summary that explains how your solution meets the following criteria:
• facilitates the development of consensus-based codes of conduct
• promotes the adoption of standards and practices
• promotes automation in cybersecurity
• improves and modernizes security assurance
• implements industry-standard security tools and infrastructure or environment
• collects digital evidence, including data for analysis or forensics
• provides cybersecurity plans, strategies, and policies
• implements confidentiality, integrity, and availability
• mitigates cybersecurity threats
• investigates cybersecurity incidents or crimes
• includes decision-support functionality
• provides a training plan for users
C. Create each of the following forms of documentation for the solution you have developed:
• a subset of comprehensive elements of cybersecurity plans, policies, standards, or procedures
• analysis of the alignment of the solution with organizational cybersecurity initiative or regulatory compliance
• assessment of the solution's implementation, including testing results and implemented revisions
• applications, tools, installation, and user guides for any other environment used
• assessment of the efficiency of the solution
• post-implementation systems and process analysis, including diagrams or descriptions of the environment
• post-implementation risk assessment
• analysis of collected data
• analysis of the final output
• stakeholder impact analysis
• post-implementation and maintenance plans for the solution, including supporting resources
• the results from the solution testing and revisions
• training plan for users
• control deficiencies analysis that includes a plan of action and milestones
• source code and executable files, with installation and user guides, if applicable
• artifacts from the domain your solution addresses (listed below)
Domain: Cyber Risk Management and Oversight
- organization chart
- cybersecurity-related policies and procedures
- strategic plans
- cybersecurity job descriptions
- cybersecurity personnel qualifications
- risk assessments
- data loss prevention analysis
- IT audit schedule
- IT audit reports and correspondence
- audit exception tracking
- risk management reports
- cybersecurity training policies and procedures
- cybersecurity training and awareness materials
Domain: Cybersecurity Controls
- list of physical access controls (e.g., key cards, biometric controls, video cameras)
- baseline security configuration standards
- vulnerability or patch management policies and procedures
- patch management reports
- penetration test results and reports
- vulnerability assessments
- continuous monitoring strategy
Domain: External Dependency Management
- list of third parties and subcontractors
- contracts governing all third-party relationships
- inventory of all third-party connections
- network topology/diagram
- independent reports on the service provider's security controls
- remote access logs
- third-party employee access reviews
- vendor management policies and procedures
Domain: Threat Intelligence and Collaboration
- list of threat intelligence resources (e.g., industry groups, consortiums, threat and vulnerability reporting services)
- management reports on cyber intelligence
Domain: Cyber Resilience
- cybersecurity event log and reports on cyber incidents
- business impact analysis
- business or corporate continuity plan
- results of resilience testing
- resilience testing reports
- cyber incident response plans
- crisis management plans
- data loss prevention analysis
- continuous monitoring strategy
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions
File name may contain only letters, numbers, spaces, and these symbols: ! - _ . * ' ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
RUBRIC
Course Instructor Signature/Date:
Answered by tufsilkh12345
itur laoreet. Na
gue
s ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac,
gue
consectetur adipiscing elit. Nam lac
ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risUnlock full access to Course Hero
Explore over 16 million step-by-step answers from our library
Subscribe to view answeripiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce du
gue
congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec alique
gue
entesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui l
ng elit. Nam
gue
ipsum dolor si
ec facilisis. Pellentesque dapibus e
risus ante, dapibus
ipsum dolor sit am
, ultrices ac magna. Fusce dui lectus, congue vel laoree
onec aliquet. Lorem ipsum dolor
sum dolor sit
gue
lestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adip
ac, dictum vitae odi
usce dui lectus, congue ve
congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congu
gue
facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac
a molestie consequat, ultrices ac magna. Fusce dui lectu
inia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui
dictum vitae odio. Donec aliquet. Lorem ipsum d
ce dui lectus, cong
amet, consectetur adi
lestie consequat, ultrices ac magn
ec facilisis. Pellentesque dapibus eff
ec facilisis. Pellentesque dapibus effi
Donec aliquet. Lorem ipsum dol
nec facilisis. Pellentesque
, ultrices ac ma
icitur laoreet. Nam risus ante, d
acinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dol
onec aliq
fficitur laoreet. Nam
m risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet,
entesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac mag
ia pulvinar tortor nec fac
s ante, dapibus a molestie
or nec facilisis. Pellentesque dapibus effi
sque dapibus efficitur laoreet. Nam risus ante, dap
facilisis. Pellentesque dapibus e
gue
amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam r
, ultrices ac magna. Fusce dui l
iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur lao
m risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dic
gue
ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consec
inia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laor
usce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia p
gue
pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante,
cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lect
ipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur lao
dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lac
gue
ipiscing elit.
facilisis. Pellentesque dap
ec facilisis. Pellentesque dapibus efficitur laoreet
m ipsum dolor sit ame
fficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices
lestie consequat,
o. Donec aliquet. Lorem ipsum dolor sit am
a molestie consequat, ultr
rem ipsum do
ongue vel lao
amet, consectet