Project #3: Sample Cyber Security Profile (System Security Plan): - Case Study Example

Comments (1) Cite this document
In a world where there are more security threats to information, there is an increased need for investment into and implementation of security controls in an organization. Having in place appropriate security controls can be of great benefit to the assets and operations of an…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Project #3: Sample Cyber Security Profile (System Security Plan):
Read TextPreview

Extract of sample "Project #3: Sample Cyber Security Profile (System Security Plan):"

Download file to see previous pages My organization seeks to boost the security of its information system from hackers and other potential threats from both within and outside the organization. My organization is a telecommunication company, providing mobile and data services. The amount of personal information that passes through our systems every day is enormous. Many distributed systems spread across the many departments in our company depend on the mobile phone network in many ways. This forces the organization to constantly refresh the information security systems every often to ensure that the system is not compromised (Humphreys, 2008). This paper shall discuss the system that my organization has settled upon, highlighting all its features and how this new security plan will ensure that the organization does not lose or have data distorted from an invasion or crushing of the system.
The security system that our organization decides to implement should be able to support the amount of data passed through it every day, while at the same time protecting all the information in it from access by unauthorized persons. To that effect, the organization funded research into the most appropriate information security system, with all the desirable security features. In order to assess the level of vulnerability of the system, the organization selected the most suitable system. The selected system is the RA-5. The RA-5 belongs to the family of Risk Assessment and is under the class of Management (Tiller, 2006).
In recognition of the fact that the security categorization plays a major role in guiding the comprehensiveness and frequency of the scans for vulnerability, we categorized the security system as being of high priority (Kim & Solomon, 2012).
The type of information system is management information system. This is because the information within the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Project #3: Sample Cyber Security Profile (System Security Plan): Case Study”, n.d.)
Project #3: Sample Cyber Security Profile (System Security Plan): Case Study. Retrieved from
(Project #3: Sample Cyber Security Profile (System Security Plan): Case Study)
Project #3: Sample Cyber Security Profile (System Security Plan): Case Study.
“Project #3: Sample Cyber Security Profile (System Security Plan): Case Study”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
nitzschebrad added comment 5 months ago
Student rated this paper as
I didn’t know how to start my research paper. "Project #3: Sample Cyber Security Profile (System Security Plan):" helped me out a lot! Especially the list of resources was valuable.

CHECK THESE SAMPLES OF Project #3: Sample Cyber Security Profile (System Security Plan):

Cyber Security

...? Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet,...
10 Pages(2500 words)Coursework

Cyber security

...regarding the type of data they store and their plans for usage. Furthermore, company staff should only access and collect data in a manner that is not deemed as illegal or unfair. Another guideline pertains to the accuracy of data collection and retention policy. In light of this policy, all employees will be expected to collect accurate and updated data. Furthermore, such data should not be retained past the required date of use (Wig). Topic 3 According to the department of Justice, cyber crime is categorically described in three distinct categories. Foremost, is the deliberate attack on other people’s computer through the spread of harmful software such as viruses. Second is the...
3 Pages(750 words)Coursework

NSA Cyber Security Profile

...? NSA Cyber Profile Institute Recent information systems are sophisticated collections of technology, processes and people, working in unison to offer institutions with the potential to procedures, transmit, store data in a timely mode to support numerous missions and commercial functions. The extent to which institutions have come to rely on these information systems to carry out routine, significant, and essential missions and business operations means that the protection of the fundamental systems is paramount to the success of the institution. The assortment of the proper security controls for an information system is an essential duty that can have major ramifications on the functions and assets of an institution as well... functions...
3 Pages(750 words)Research Paper

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Cyber Security

...and technology, the possibility of cyber threat increases. Cyber criminals vary from organized group of hackers supported by various kinds of political, ethical or retaliatory motives to virtual robbery activities, inspired by financial gain. It is vital for organizations to understand the profile and mode of operations of targeted areas. According to Martin (2013), “Targeted, organized and long-term threats categorized as “advanced persistent threats” can be a significant problem due to sophisticated technology, expert attackers and potentially Nation State sponsorship” (p.1). The main objective of this paper is to analyze the concept of cyber security...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Stuxnet is a computer virus designed specifically to aid hackers attack industrial plants without the knowledge or identification of the operators. It is the first attack that grants the hackers the opportunity of manipulating world equipment and as a result of this, it is very dangerous. Stuxnet is a product of the U.S and Israel project (Bacrach, 2013). Its impact is well known; it destroyed approximately 20% of Iran’s nuclear centrifuges through making them spin uncontrollably. It also infected a Russian nuclear power plant very badly. In tandem to this, the paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how...
3 Pages(750 words)Essay

Sample Cyber Security Profile

...of user rights. Data centric needs are then breached which creates an issue for Plunder properties. In essence, the PAA is a written, explicit agreement that a user must acknowledge to. The PAA allows the security team to generally have a contingency plan, audit in timely manner. The PAA is a typically a two page document between administration and organization. It can also enhance the dictating policy utilizing social media. Security Assessment Policy is a governing legislation that outlines Information Security policies, employee orientation, security incidents and plans for new and existing users. It allows users to understand and...
4 Pages(1000 words)Essay

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security al Affiliation Cyber Security Cyber security is emerging global challenge that has seen some s such as North Korea and China implicated in cyber-attacks. Cyber-attack is possible because of cyberspace, a situation where all computers globally are connected to the Internet. Cyberspace comprises of computers, mobile phones and computer network. A state cyberspace, for example, is a global cyberspace because Cyberspace has no borders. Computer networks make a nation cyberspace a global cyberspace. An individual in one side of the world can access information on the other side of the world....
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Project #3: Sample Cyber Security Profile (System Security Plan): for FREE!

Contact Us