Must read all instruction from each RUBRIC
Guidelines for Submission: Your paper must be submitted as a 2- to 4-page Microsoft Word document with 12-point Times New Roman font, double spacing,
one-inch margins, and at least three sources cited in APA format.
Overview: You have been hired as a cybersecurity professional to conduct a security assessment on Limetree Inc.’s systems and processes to identify the root cause of the security breach and discover additional vulnerabilities that could impact Limetree’s operation in the future. Your assessment of Limetree Inc.’s environment will be conducted by reviewing your Final Project Scenario document (located in Module Seven of your course). For part of this assessment, you will incorporate into your analysis the results of the interview with Jack Sterling (security manager) found in the scenario, and you will be able to identify vulnerabilities related to systems security, personnel and administrative security, and physical security, relating these to the breach from your physical vulnerabilities short paper in Module Three.
Prompt: Review your entire final project and develop a suitable Security Test Plan based on the scenario presented the final project scenario. Be sure to discuss the following in your plan:
Impact: In this section, you will discuss the possible impacts of applicable cybersecurity regulations to the business or organization.
Application: Describe the government and industry regulations that apply to the business or organization in relation to the security breach.
Impact: Discuss how the regulations impact the business or organization and its information security, supporting with specific examples.
Financial and Legal Implications: Discuss possible financial and legal implications of the security breach for the business or organization.
Security Test Plan: In this section, you will develop a security test plan for the breached system, basing your plan on your analysis of the security breach and established cybersecurity standards such as those from the National Institute of Standards and Technology (NIST) and risk management frameworks.
Scope: Determine the scope of the risk assessment based on analysis of the security breach and established cybersecurity standards.
Resources: Document the resources required for the risk assessment, based on analysis of the security breach and established cybersecurity
standards
Hardware and Software: Create a list of system hardware and software within target of risk assessment, based on analysis of the security breach
and established cybersecurity standards.
Tools: Determine the necessary tools for the risk assessment, based on the list of system hardware and software you created.
Timeline and Benchmarks: Outline a timeline and benchmark data, based on analysis of the security breach and established cybersecurity
standards.
Approach: Describe your approach based on analysis of the security breach and established cybersecurity standards.
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
