The aim is to create a defense in depth scheme


The aim is to create a defense in depth scheme for an aspect of Humongous Holdings. Your job will be to do the following things. Purpose – This is a focused justification for the project as a whole – provides a rationale for doing it as well as a sense of what you’re going to (the solution you see) this is aimed at giving you the guidance for all the rest of the ideas you are going to put in this – might be called a statement of the strategy you are going to employ -Scope – this is the precise definition of the shape of the perimeter – what’s in and what’s out and why… this comes down to your itemization of all protection objects and the assignment of priorities from the RA – this defines what you’ll protect – keep it precise (meaning narrow) – the scope has to fit the time and resources available. Business Case – this is the reason why you’re doing it… you tie the project to the value proposition for the business – why is this important and worthy – detail the explanation in real world termsFinal Project CYBE 5700 Principles of Cybersecurity
This is a groupware based project. You will execute it in a team. The aim is to create a defense
in depth scheme for an aspect of Humongous Holdings. Your job will be to do the following
o Scope – identify a homogenous aspect of the HH operation that can be sufficiently
protected within a given set of resources.
o Protection Objects – categorize and list the objects within the scope of the protection
that you choose to defend. Ensure that these have been properly prioritized and
assigned to the protection perimeters that you have defined
o Business Case – make a coherent business case to protect the objects that you select
o Threat/Risk Environment – identify the logical threats and their associated risks by
likelihood and impact
o Assurance Case – make a coherent assurance case for the protection approach that you
will employ
o Proposed Controls – at a consistent level of application and properly mapped to the
assurance case
o Proposed Control Testing and Evaluation Methods – at a level appropriate to the
assurance case
o Proposed Control Acceptance/Finalization Process – appropriate to the business and
assurance case you laid out
o Proposed Audit/Authorization Plan – where outside authorization of control
correctness might be required, or sought (e.g., FISMA)
o Proposed Continuous Monitoring/Operational Security Plan – at a level appropriate to
the threat environment and priority of the assets.
This plan will be no less than twelve pages and it will clearly detail all of the required elements.
Graphs, tables and analyses are acceptable and desirable. A TOC is required.

Purchase answer to see full

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.