15 Jan You will be required to write one term paper this semester. The specifications are as follows:? You must write a 4-6 page term paper on a topic of your choice related to?IT Sec
Instructions
You will be required to write one term paper this semester. The specifications are as follows:
- You must write a 4-6 page term paper on a topic of your choice related to IT Security: Planning and Policy (ALL TOPICS MUST BE APPROVED). Some examples would include, BYOD Policies, Remote Access Policies, DRP, BCP or Privacy Policies. Please write the term paper in a Word document and then upload it for grading.
- Your term paper outline is due at the end of Week 2.
- Your term paper is due at the end of Week 7.
- In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
- Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name. You must have a minimum of 3-5 outside sources.
- Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
- Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
- When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
- PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.
Cristian DeWeese
ISSC481
American Military University
12/14/2023
Professor Heuermann
Introduction and Literature review:
As digital technologies and cyber threats rise, businesses must defend their security assets more than ever (Corallo et al., 2020). This study examines how these assets maintain organizational continuity and resilience and emphasizes the need to recognize and protect them. A detailed definition of important security assets appears in the literature study. Data, systems, and IP assets are heavily impacted by breaches, highlighting the need for significant prevention despite the rules provided by NIST and ISO/IEC 27001.
Importance and strategies of Identifying Critical Security Assets :
The section highlights the risks of unidentified assets, including cyberattacks and business continuity disruptions, and emphasizes the importance of identifying critical security assets for organizational resilience. Strategic methods, including asset inventory, classification, and risk assessment, are discussed.
Protection, Challenges and Future Trends of Critical Security Asset:
Organizations must implement cybersecurity measures, staff training, and an incident response plan to protect critical security assets. Encryption, access restrictions, and regular upgrades are crucial. Future trends like AI and IoT necessitate constant innovation in countermeasures.
Conclusion:
This study shows how important identifying and protecting crucial security assets is. Case studies and lessons learned inform these resilience-boosting ideas for enterprises. Security must adapt to new problems and trends in a constantly changing digital economy.
References:
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in industry, 114, 103165.
Da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers & Security, 92, 101713.
Hart, S., Margheri, A., Paci, F., & Sassone, V. (2020). Riskio: A serious game for cyber security awareness and education. Computers & Security, 95, 101827.
Lewis, T. G. (2019). Critical infrastructure protection in homeland security: defending a networked nation. John Wiley & Sons.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.