WGU D490;MSCSIA Capstone Final
Task/DDN1 Task 3 Latest 2024 with complete
solution
D490
,WGU D490;MSCSIA Capstone Final
Task/DDN1 Task 3 Latest 2024 with complete
solution
Building an Information Security Program: One Critical Control at a Time
A Capstone Presented to the Information Technology College Faculty
of Western Governors University
in Partial Fulfillment of the Requirements for the Degree
Master of Science in Cyber Security and Information
Assurance
, Abstract
Organizations, like Red River Management Partners (RRMP), through accelerated
expansion and growth due to aggressive company mergers and acquisitions, have a
responsibility to its customers, outside partnerships, and employees to provide a methodology of
culpability and integrity. RRMP is a privately owned international enterprise focused on three
areas of business: Property Management with a management portfolio of 400,000 units,
Construction & Development, and Investments. RRMP is the leader in the multi-family
management industry, but they lack network visibility which leaves the organization vulnerable
to malware, cyber- intrusions, or corporate espionage. More importantly, documented security
controls, policies, and procedures are non-existent. To help mitigate these risks, RRMP will
develop a security framework based on the Center for Internet Security (CIS) Critical Security
Controls for Effective Cyber Defense principles.
The research methodology will include a security audit and vulnerability assessment of
the existing network. The audits will help identify internal and external threats, as well as,
network vulnerabilities. The security framework will be implemented in three phases:
• Phase 1: Implement inventory control application
• Phase 2: Implement vulnerability scanning tools/account management control
• Phase 3: Implement event management and anomaly detection
The expected outcome for RRMP has improved incident response, classification and
defining security incidents, handling of security incidents, and standardization of a security
posture within RRMP. In addition, RRMP will gain improved visibility into the network
through the implementation of network monitoring and vulnerability assessment tools. This will
allow them to have a proactive strategy in their security defenses rather than reactive one.
Finally, RRMP will improve their security posture by knowing what devices or software are on
their
, network using inventory control management software. This centralized software solution will
provide the Information Technology (I.T.) staff a visual representation and offer reports of all
devices recently connected to the network. Used in conjunction with each other, these tools will
provide a holistic, and foundational, network solution to ensure security protocols can be
implemented easily in the future.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Wiseman. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.49. You're not tied to anything after your purchase.