logo

Cyber Security Project Plan and Implementation

   

Added on  2023-06-10

14 Pages2637 Words186 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note
Cyber Security Project Plan and Implementation_1
1CYBER SECURITY
Table of Contents
Rationale:...................................................................................................................................3
Problem Domain:...................................................................................................................3
Purpose:..................................................................................................................................3
Sponsor or Supervisor Recommendation:..................................................................................4
Theoretical Framework:.............................................................................................................4
Methodology:.............................................................................................................................5
Research & System Development Method:...........................................................................5
Data Collection Method:........................................................................................................5
Ethical Issues:.........................................................................................................................6
Compliance Requirements:....................................................................................................6
Analysis of Data:....................................................................................................................6
Project Plan:...............................................................................................................................7
Duration:................................................................................................................................7
WBS:......................................................................................................................................9
Gantt chart:...........................................................................................................................10
Risks Analysis:.....................................................................................................................10
Cyber Security Project Plan and Implementation_2
2CYBER SECURITY
Rationale:
In the recent time the number of cybercrime is increasing rapidly so it is necessary for
the organization to develop a cybersecurity measurement for the organization. The businesses
and the companies are in front of the risks as they are over dependent on the information
technology. The decision maker and the policy makers are managing the challenges without
concerning about the consequences of the risks. It is necessary for the business or the
organization to establish a proper cyber security so that the data get safe and will not be
breached by the cyber attackers (Dark et al., 2015). It is necessary to identify the particular
risk and then apply the proper method of cyber security.
Problem Domain:
There are many problem that are associated with cyber security implementation
because day by day the scenario of cyber-attacks are changing rapidly. Several techniques of
cyber-attack needs different method of cyber security. Many old problems that are used
earlier for cyber-attack is used now a days like the ransom ware attack. It is a major worry for
the cyber security officer to implement all the measures properly according to the
requirement (Phillips, 2017). The cyber assets and the sensitive data must be protected from
being violated. To protect the data integrity it is necessary to develop a project of cyber
security that will mitigate all the risks associated with cybercrime.
Purpose:
The main purpose of the project is to create an environment which will protect the
data and the activities on the internet. Cyber security project will be applied to the several
business and the organization to provide data security on the organization (August &
Learning, 2015). The vision of the project is to provide cyber security solutions continuously
to the organizations that are in the market right now. In the recent time the amount of
problem related to cyber security is increasing rapidly. As the data rate is increasing the
Cyber Security Project Plan and Implementation_3
3CYBER SECURITY
amount of the cyber-attacks also increased to attack the sensitive data of the victims. These
attacks has a huge impact on the victims as their digital identity is also at stake so it is
necessary for the individuals also to protect their own data by apply several precautions of
cyber security (Chapman, 2017). There are many strategic objectives of the project which
encounter with the new risks that are identified in the current market of the information
technology.
Sponsor or Supervisor Recommendation:
In the recent time the data is being stored on the cloud platform. The cloud has three
different services SaaS, PaaS and IaaS. Among these three the SaaS is less secure as the data
is protected by the SaaS provider to it is necessary and recommended that proper security
measures must be taken to secure the data when the data will be migrated to the SaaS. It is
required to the project supervisor to assess all the requirement and the after consequences
while implementing the cyber security project (Knowles et al., 2015). The pattern of cyber-
attacks is changes as the time goes on so it is necessary for the project sponsor to make the
development which will be capable of tackling the future attacks as well. The project must
follow all the assessment while implementing otherwise there will be chance that the project
might get fail.
Theoretical Framework:
It is necessary for any kind of project to describe the theoretical framework properly
so that it will guide all the processes that are related with the project. In the project of cyber
security implementation it is necessary to assess the conceptual and theoretical framework
properly, so that all the processes of the cyber security project will be implemented properly.
By the use of the framework the developer will assess the future prediction of the project like
Cyber Security Project Plan and Implementation_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Project Proposal and Plan, Cloud Security - ITC 568
|12
|2096
|1387

Managing Cyber Security Challenges
|12
|2039
|43

Biometrics Security Project Plan
|11
|2031
|450

Big Data Security - Report
|8
|2458
|13

Emerging Technology And Innovation | Assessment
|15
|2340
|19

Role of Cryptography in Cyber Security: Assignment
|11
|3457
|92