In this Assignment, you will analyze the NIST Cybersecurity framework. You will determine if it can be used as a guide to produce an action plan/framework for the company to use in an effort to reduce the likelihood of insecure application development and insider threats. If it cannot be used/mapped to the software company, then what framework or method is better suited for the software company? Will you use various frameworks/guides and result in a hybrid approach? You have to produce an action plan/framework, so it is important for you to do as much research as possible on other types of solutions.
It is very important for you to consider that the cybersecurity landscape includes cyber criminals, hackers, activists, etc., who use the latest technological tools and technologies to cause harm. The action plan/framework that you create should be agile enough so it can adapt to changing risk environments over time. Finally, as you formulate your plan, costs will have to be justified in time, so consider the revenue of the company and an industry standard percentage spent on cyber security budgets.
Your action plan should be at least 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s). If applicable, be sure to document your content with proper APA in text citations that match your reference list. You can have more than one table and more than one figure; however, they must be fully explained.
You must support your research and assertions with at least three credible sources. You may use peer-reviewed articles, trade magazine articles, or IT research company (Gartner, Forrester, etc.) reports to support your research; you can use the Library to search for supporting articles and for peer-reviewed articles. Wikipedia and similar sources are unacceptable.
In accordance with the University Academic Integrity policy, your Assignment will be automatically submitted to TurnItIn (see: http://turnitin.com/en_us/features/originalitycheck). The policy states that papers submitted for credit in any course should contain less than 25% “non-original” material, so avoid large sections of direct quotes and be sure that you use APA formatting to properly cite and reference all non-original material.
National Institute of Standards and Technology. (2015). Executive Order 13636: Cybersecurity Framework. Retrieved from http://www.nist.gov/cyberframework/
- At least 5–6 pages of content (exclusive of cover sheet etc.), using Times New Roman font style, 12pt, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s).
- At least three credible sources
- No spelling errors.
- No grammar errors.
- No APA errors.