Jents
Four Separate submissions please!!!
Submission for Adius Simtray Report – 1 Page Report (please rewrite attached)
Standards Summary – 1 page Summary
Written Comments – 2/3 Page Report
Please select an industry and write a short paragraph about industry-specific cyber issues. (discussion post)
P3
Four Separate submissions please!!!
Submission for Adius Simtray Report –
1 Page Report (please rewrite attached)
Standards Summary – 1 page Summary
Written Comments
– 2/3 Page Report
Please select an industry and write a short paragraph about industry-specific cyber issues. (discussion post)
Project Scenario
As the assistant vice president of information security, you are the main cybersecurity advisor to the chief executive officer of your company. The organization responsible for creating standards for your industry has proposed cybersecurity standards for all publicly traded companies and has asked for comments from the industry regarding what these standards should contain.
“This is our opportunity to weigh in on how best to achieve cyber objectives within the constraints of our business,” the CEO says during your executive staff meeting. You realize that this is your chance to show the CEO your knowledge of the industry, and an opportunity for your company to influence prospective standards that could impact the company’s bottom line.
The CEO turns to you and says, “As a leader in our industry, we know what processes work and what do not. I believe we are in the perfect position to help formulate cybersecurity standards that are realistic and effective. I will need your assistance in preparing written comments to present a proposed standard.
“First, determine the impact these new standards might have on our industry. Then assess our industry’s cyber posture and create a relevant standard. Prepare our written comments based on these considerations. You will need to have a draft ready for my review at our next staff meeting.”
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
· 1.6: Follow conventions of Standard Written English.
· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
· 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards.
Step 1
Throughout this project, you will assume the perspective from an organization of a particular industry.
In order to prepare your perspective, you will complete the following:
· Select a specific industry from one of the following areas: health care, finance, telecommunications, automotive, or retail upon which you will focus your oral statement. For example, you may choose to research the industry of grocery stores (retail) or hospitals (health care). Do not select a specific company focus on the industry.
· Research and write a short paragraph about the cybersecurity issues you discover for your particular industry.
Once you select your industry and identify its cyber issues, submit your findings to the discussion board to get feedback from your instructor.
Step 2
SIMTRAY Adius: Day 1
SIMTRAY is a simulation that presents you with scenarios that will provide insight into the origins of issues affected by major regulatory/legal concerns facing every organization or industry. While this simulation focuses specifically on the financial industry, you will find that this exercise will help you examine the regulatory concerns for your chosen industry. Some of the issues and topics addressed in this exercise include cybersecurity policies, countermeasures, sql injection, digital evidence, cyber attacks & threats, mobile technologies, outsourcing – security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA).
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 3
SIMTRAY Adius: Day 2
In the previous step, you started to examine the SIMTRAY, “Adius: Find Your Way in Three Days.”In this step, continue to focus on SIMTRAY, but document the specific type of regulatory issues you encounter in your scenario since these same issues may be relevant to the industry you chose to examine for your oral presentation. Some of the issues and topics addressed in this exercise include cybersecurity policies, countermeasures, sql injection, digital evidence, cyber attacks & threats, mobile technologies, outsourcing – security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA).
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation.
Step 4
Project Practice – SIMTRAY Adius: Day 3
In this step, you should continue to explore the scenarios within the SIMTRAY, “Adius: Find Your Way in Three Days.” If you have not already, you will most likely encounter the following topics in this exercise: cybersecurity policies, countermeasures, SQL injection, digital evidence, cyber attacks & threats, mobile technologies, outsourcing – security threats, cloud computing, and the Gramm-Leach-Bliley Act (GLBA). Document events that you experience in the exercise that might affect the following industries:
· health care
· finance
· telecommunications
· automotive
· retail
Think about how these issues will be affected by proposed regulation and begin to explore how you might be able to influence agencies to formulate appropriate standards favorable to a particular industry.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need.
Compile your recorded scores, lessons learned, and documented industry issues into a one-page report
.
Submit your report for feedback.
Step 5
Assess Industry Cyber Posture and Create a Relevant Standard
Now that you have chosen your industry and you are aware of the cyber issues affecting it, it is time to identify a standard to address one of the cyber issues you identified. For example, in response to the credit card fraud in the retail industry, the bank card industry adopted the chip and PIN standard for credit cards. Using feedback you received from your instructor in previous steps, create a cybersecurity standard relevant to your chosen industry. Refer to
industry-specific regulations
for additional background on existing regulations.
Create a relevant standard and write a
one-page summary
documenting the standard and evaluating the impact it would have on your selected issues and business operations in your industry. This summary will be included in your written comments in the following step.
Submit your Standards Summary for feedback.
Step 6
Written Comments
Develop your final written comments for presentation at the next standards body meeting. These comments should be between
two and three pages
, and it should include a paragraph on your thoughts about how your comments will be received and whether or not they will have an impact on the regulation/standard, etc. Update the Standards Summary from the previous step according to the feedback you received. Attach the Standards Summary to your written comments. (The Standards Summary should not be included in the length requirement of the written comments.)
Submit your written comments.
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
· 1.6: Follow conventions of Standard Written English.
· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
· 5.3: Support policy decisions with the application of specific cybersecurity technologies and standards.
Running head: ADIUS REPORT 1
ARDIUS REPORT 2
Adius Simtray Report
Please rewrite
Cyber security has now grown in different industries across the globally. Typically, the aspect refers to the process where various information and data management regulations and policies are developed to maintain data safety from the various aspects like natural calamities, cyber-attacks on data, data exploitations and misuse, as well as the damages by people for their own uses. This paper will therefore provide a report of the Adius Simtray Report captures various concepts related to various security measures in different industries.
From the Adius Simtray, it was evident that an organization cyber security is vital for the data security. However, there were various policies that were illustrated. Firstly, there were the communication policies that were set to ensure that the data sent via any device was secure. For example, encryption, intrusion detection as well as authentication policies are the elaborated policies in the Simtray. Based on the realization of the various policies elaborated in the Adius Simtray, an interest in the Health industry was prevalent. This industry seems to be requiring the implementation of the various communication policies as the HIPAA act and the HiTech Act dictates.
From the elaboration of the Adius Simtray, different types of cyber-attacks were elaborated. The pinpointed attacks include the SQL injection, the side scripting, as well as server hacking (Kolhe, & Adhikari, 2014). The malicious act leads to the exposition of information that is relevant in an organization to unauthorized persons. Therefore, the data requires protection in accordance to the set cyber security policies. Data security measures to be involved in such a case include data encryption as well as the process of access control. The involvement of the court of law is also vital when reporting the malicious data exposition. Al in all, the ardioud Simtray was a good platform for highlighting various cyber security risk factors and their mitigation.
References
Chen, J. Q., & Benusa, A. (2017). HIPAA security compliance challenges: The case for small healthcare providers. International Journal of Healthcare Management, 10(2), 135-146.
Dankar, F. K., & El Emam, K. (2012, March). The application of differential privacy to health data. In Proceedings of the 2012 Joint EDBT/ICDT Workshops (pp. 158-166). ACM.
Kolhe, A. K., & Adhikari, P. (2014). Injection, Detection, Prevention of SQL Injection Attacks. International Journal of Computer Applications, 87(7).