You will be required to write one term paper this semester. The specifications are as follows:? You must write a 4-6 page term paper on a topic of your choice related to?IT Sec
Instructions
You will be required to write one term paper this semester. The specifications are as follows:
- You must write a 4-6 page term paper on a topic of your choice related to IT Security: Planning and Policy (ALL TOPICS MUST BE APPROVED). Some examples would include, BYOD Policies, Remote Access Policies, DRP, BCP or Privacy Policies. Please write the term paper in a Word document and then upload it for grading.
- Your term paper outline is due at the end of Week 2.
- Your term paper is due at the end of Week 7.
- In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.
- Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name. You must have a minimum of 3-5 outside sources.
- Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
- Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.
- When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
- PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.
Cristian DeWeese
ISSC481
American Military University
12/14/2023
Professor Heuermann
Introduction and Literature review:
As digital technologies and cyber threats rise, businesses must defend their security assets more than ever (Corallo et al., 2020). This study examines how these assets maintain organizational continuity and resilience and emphasizes the need to recognize and protect them. A detailed definition of important security assets appears in the literature study. Data, systems, and IP assets are heavily impacted by breaches, highlighting the need for significant prevention despite the rules provided by NIST and ISO/IEC 27001.
Importance and strategies of Identifying Critical Security Assets :
The section highlights the risks of unidentified assets, including cyberattacks and business continuity disruptions, and emphasizes the importance of identifying critical security assets for organizational resilience. Strategic methods, including asset inventory, classification, and risk assessment, are discussed.
Protection, Challenges and Future Trends of Critical Security Asset:
Organizations must implement cybersecurity measures, staff training, and an incident response plan to protect critical security assets. Encryption, access restrictions, and regular upgrades are crucial. Future trends like AI and IoT necessitate constant innovation in countermeasures.
Conclusion:
This study shows how important identifying and protecting crucial security assets is. Case studies and lessons learned inform these resilience-boosting ideas for enterprises. Security must adapt to new problems and trends in a constantly changing digital economy.
References:
Corallo, A., Lazoi, M., & Lezzi, M. (2020). Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in industry, 114, 103165.
Da Veiga, A., Astakhova, L. V., Botha, A., & Herselman, M. (2020). Defining organisational information security culture—Perspectives from academia and industry. Computers & Security, 92, 101713.
Hart, S., Margheri, A., Paci, F., & Sassone, V. (2020). Riskio: A serious game for cyber security awareness and education. Computers & Security, 95, 101827.
Lewis, T. G. (2019). Critical infrastructure protection in homeland security: defending a networked nation. John Wiley & Sons.
Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176-8186.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.