implementing a risk mitigation strategy
Order ID 53563633773 Type Essay Writer Level Masters Style APA Sources/References 4 Perfect Number of Pages to Order 5-10 Pages Description/Paper Instructions
implementing a risk mitigation strategy
This assignment requires you to complete a cyber risk mitigation strategy for Sony Pictures Entertainment organization.
you are required to create a risk mitigation strategy that the organization should have followed in light of the 2014 hack.
Introduction
Write a brief paragraph in which you provide a high-level overview of SPE need for a risk mitigation strategy.
(150 words)
Vision
Outline SPE’s vision of what implementing a risk mitigation strategy will ideally achieve.
(150 words)
Strategic goals and objectives
List at least four strategic goals SPE must achieve to reduce its risks to an acceptable level. List at least two objectives under each strategic goal that explain what must be done to achieve the strategic goal.
Note: A thorough risk mitigation strategy should include associated action plans and milestones, but you are not required to detail these for the purposes of this submission.
(450 words)
Start writing here:
Metrics
List at least three metrics SPE will use to analyze the achievement of its goals/objectives. These metrics should be specific to the goals/objectives listed in the previous question.
(150 words)
Start writing here:
Threat actors and methods of attack
Integrate your submission from Module 2, in which you identified at least two threat actors to SPE, and described methods of attack these actors could use.
If you are using the Sony case, integrate the submission in which you identified the threat actor Sony faced in the 2014 hack and their method of attack, as well as at least one other threat actor Sony could face in the future and what method of attack they might use.
(550 words)
Start writing here:
Business critical assets
identified the assets that are most essential to Sony’s ability to accomplish its mission. Describe what vulnerabilities there may be in SPE’s systems, networks, and data that may put these assets at risk.
(550 words)
Start writing here:
Cybersecurity governance
Integrate the three questions from your Assignment, in which you recommended a cybersecurity leadership plan, improvements to management processes, and a cybersecurity awareness training program.
(1,200 words)
Start writing here:
Protective technologies
In one of your submission, you compiled a list of questions you would ask to understand the technologies implemented to protect your organization’s critical systems, networks, and data. In this section, based on the questions you asked and by conducting any other additional research, identify technologies your organization can employ to protect its critical systems, networks, and data.
If you are using the Sony case, recommend protective technologies that could have addressed Sony’s shortcomings in protecting their critical networks, systems, and data.
(650 words)
Start writing here:
Legal considerations
research discuss the legal considerations SPE should consider when compiling its risk mitigation strategy. recommend steps that could have addressed Sony’s shortcomings in protecting themselves from legal action.
(550 words)
Start writing here:
Your ongoing project submission will be graded according to the following rubric:
Very poor Poor Satisfactory Very good Exceptional Adherence to the brief All sections in the template are completed.
Answer falls within the prescribed word count (4,500 words).
No submission, or student fails to address any element of the brief. (0) Some key elements are not addressed. Most information provided is irrelevant. OR
Answer does not fall within the prescribed word count (100 words over word count). (5.5)
Student has adhered to most of the brief. Sufficient information is provided and is mostly relevant. (7) Student has adhered to almost all elements of the brief. Almost all information is provided and is relevant. (8.5) Student has fully adhered to the brief. All information provided is comprehensive and relevant. (10) Introduction and vision Student has clearly outlined the need for their risk mitigation strategy, and what it aims to achieve by implementing the strategy.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to clearly outline the need for the strategy or its long-term vision.
There is no evidence that the student has used the content covered in the course to inform their response. (0)
Student shows an incomplete understanding of the need for their strategy, or its long-term vision. There is some evidence that the student has engaged with the content covered in the course but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of the need for their strategy, and its long-term vision. The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of the need for their strategy, and its long-term vision. The answer shows a strong grasp of the content. (8.5) Student demonstrates a thorough and incisive understanding of the need for their strategy, and its long-term vision. The student has been able to critically apply their learning from the course. (10) Strategic goals and objectives Student has outlined at least four strategic goals that will reduce their organization’s risks to an acceptable level. They have included at least two objectives that clearly explain what must be done to achieve each goal.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to clearly outline their strategy’s goals and objectives.
There is no evidence that the student has used the content covered in the course to inform their response. (0)
Student shows an incomplete understanding of their strategy’s goals and objectives. There is some evidence that the student has engaged with the content covered in the course but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of their strategy’s goals and objectives. The student has clearly engaged with the content covered in the course, but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of their strategy’s goals and objectives. The answer shows a strong grasp of the content. (8.5)
Student demonstrates a thorough and incisive understanding of their strategy’s goals and objectives. The student has been able to critically apply their learning from the course. (10)
Metrics The student has listed at least three metrics their organization could use to measure the achievement of their goals, and the metrics are specific to the goals/objectives identified.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to list three metrics their organization could use to measure cybersecurity. The metrics are not specific to the identified goals/objectives.
There is no evidence that the student has used the content covered in the course to inform their response. (0)
Student shows an incomplete understanding of metrics their organization could use to measure its cybersecurity. The metrics lack relevance to the identified goals/objectives.
There is some evidence that the student has engaged with the course content, but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of the metrics their organization could use to measure its cybersecurity and they are relevant to the goals and objectives identified. The student has clearly engaged with the course content but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of the metrics their organization should use, and they are specific to the goals/objectives identified. The answer shows a strong grasp of the content. (8.5)
Student demonstrates a thorough and incisive understanding of the metrics their organization can use, and they are specific to the goals/objectives identified. The student has been able to critically apply their learning from the course. (10)
Cybersecurity threat actors Student has identified at least two threat actors and described a scenario of an attack.
In the case of Sony, student has accurately identified the threat actor and method of attack in the 2014 hack, as well as one other potential threat actor.
Student has thought critically and incorporated learnings from the content and has applied this to their chosen organization.
No submission. OR
Student fails to list two threat actors that could attack their organization. They have not provided a possible method of an attack.
There is no evidence that the student has used the course content to inform their response. (0)
Student shows an incomplete understanding of the threat actors who could attack their organization and the possible method of attack. There is some evidence that the student has engaged with the course content, but this is not always accurately applied. (5.5
Student demonstrates satisfactory understanding of the threat actors who could attack their organization and the possible method of attack. The student has clearly engaged with the course content but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of the threat actors who could attack their organization and the possible method of attack. The answer shows a strong grasp of the content. (8.5)
Student demonstrates a thorough and incisive understanding of the threat actors who could attack their organization and the possible method of attack. The student has been able to critically apply their learning from the course. (10)
Business critical assets Student has identified the assets that are most essential to their organization, and described vulnerabilities these assets may be exposed to.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to identify the assets that are critical to their organization and accurately describe how these assets are vulnerable.
There is no evidence that the student has used the course content to inform their response. (0)
Student shows an incomplete understanding of their organization’s critical assets, and how they are vulnerable. There is some evidence that the student has engaged with the course content but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of their organization’s critical assets, and how they are vulnerable. The student has clearly engaged with the course content but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of their organization’s critical assets, and how they are vulnerable. The answer shows a strong grasp of the content. (8.5) Student demonstrates a thorough and incisive understanding of their organization’s critical assets, and how they are vulnerable. The student has been able to critically apply their learning from the course. (10) Cybersecurity governance Student has recommended cybersecurity leadership plan, improvements to management processes, and a cybersecurity awareness training program.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to recommend a cybersecurity leadership plan, improvements to management processes, and a cybersecurity awareness training program. There is no evidence that the student has used the course content to inform their response. (0)
Student shows an incomplete understanding of cybersecurity leadership plans, management processes, and cybersecurity awareness training programs. There is some evidence that the student has engaged with the course content but this is not always accurately applied. (5.5) Student demonstrates satisfactory understanding of cybersecurity leadership plans, management processes, and cybersecurity awareness training programs. The student has clearly engaged with the course content but a more nuanced answer is required. (7) Student demonstrates a strong understanding of cybersecurity leadership plans, management processes, and cybersecurity awareness training programs. The answer shows a strong grasp of the content. (8.5) Student demonstrates a thorough and incisive understanding of cybersecurity leadership plans, management processes, and cybersecurity awareness training programs. The student has been able to critically apply their learning from the course. (10) Protective technologies Student has accurately identified protective technologies that are, or should be, implemented to enhance their organization’s cybersecurity.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to identify protective technologies that are, or should be, implemented to enhance their organization’s cybersecurity.
There is no evidence that the student has used the course content to inform their response. (0)
Student shows an incomplete understanding of the necessary protective technologies that are, or should be, implemented to enhance their cybersecurity. There is some evidence that the student has engaged with the content covered in the course but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of the technologies that are, or should be, implemented to enhance their cybersecurity. The student has clearly engaged with the course content but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of the technologies that are, or should be, implemented to enhance their cybersecurity. The answer shows a strong grasp of the content. (8.5)
Student demonstrates a thorough and incisive understanding of the technologies that are, or should be, implemented to enhance their cybersecurity. The student has been able to critically apply their learning from the course. (10)
Legal considerations Student has critically analyzed the legal considerations their organization should take into account.
Student has thought critically and incorporated learnings from the content.
No submission. OR
Student fails to critically analyze the legal considerations their organization should take into account.
There is no evidence that the student has used the course content to inform their response. (0)
Student shows an incomplete understanding of legal considerations that their organization should take into account. There is some evidence that the student has engaged with the course content but this is not always accurately applied. (5.5)
Student demonstrates satisfactory understanding of legal considerations that their organization should take into account. The student has clearly engaged with the course content but a more nuanced answer is required. (7)
Student demonstrates a strong understanding of the legal considerations their organization should take into account. The answer shows a strong grasp of the content. (8.5)
Student demonstrates a thorough and incisive understanding of the legal considerations their organization should take into account. The student has been able to critically apply their learning from the course. (10)
Application of course content to organizational context The student has accurately applied the learnings from the course content to their own organization or Sony’s unique context.
No submission OR
The student has not made use of their organization’s unique organizational context and constraints to inform their response (0)
Student has demonstrated a limited understanding of their organization’s unique context and constraints and context (5.5) Student has demonstrated a satisfactory understanding of their organization’s context and constraints, however a there is room for deeper engagement with its nuances. (7) There is clear evidence that the student has thought about their organization’s unique context and constraints, and catered for this in their strategy accordingly. (8.5) There is strong evidence that the student has understood and thought carefully about their organization’s unique context and constraints, and has provided considered recommendations in their strategy accordingly. (10) Organization of writing Answer should be structured clearly and logically.
No submission or complete lack of logical structure. (0) Answer has some logical structure, but not enough to justify a passing grade. (5.5) Answer is structured fairly well in terms of logic and clarity. (7) Answer is structured very well in terms of logic and clarity. (8.5) Answer is structured exceptionally well in terms of logic and clarity. (10) Total: 110 points
RUBRIC
QUALITY OF RESPONSE NO RESPONSE POOR / UNSATISFACTORY SATISFACTORY GOOD EXCELLENT Content (worth a maximum of 50% of the total points) Zero points: Student failed to submit the final paper. 20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. 30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. 40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. 50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. Use of Sources (worth a maximum of 20% of the total points). Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. 5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. 10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. 15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. 20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. Grammar (worth maximum of 20% of total points) Zero points: Student failed to submit the final paper. 5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors 10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors 15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. 20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. Structure of the Paper (worth 10% of total points) Zero points: Student failed to submit the final paper. 3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. 5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper 7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. 10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper. GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
CLICK ON THE LINK HERE: https://www.perfectacademic.com/orders/ordernow
Also, you can place the order at www.collegepaper.us/orders/ordernow / www.phdwriters.us/orders/ordernow
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME]and Have It Done by Our PhD Qualified Writers!!