icon

Usetutoringspotscode to get 8% OFF on your first order!

CSIA 350 6381 Cybersecurity in Business and Industry (2168) Industry Profile

CSIA 350 6381 Cybersecurity in Business and Industry (2168) Industry ProfileIntroduction Provided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does this industry benefit society? Addressed sources of demand for cybersecurity products and services. Appropriately used information from 3 or more authoritative sources. (Reuse of narrative from Case Study #3 is permitted).Operational Risks (Suppliers) Provided an excellent overview of the operational risks and sources of operational risks which could affect suppliers of cybersecurity related products and services. Addressed the potential impacts on products & services (compromised security). Discussed the potential impact of such compromises upon buyers and the security of buyers organizations (risk transfer). Appropriately used and cited information from 3 or more authoritative sources.Product Liability in the Cybersecurity Industry Provided an excellent discussion of product liability in the cybersecurity industry. Summarized the current legal environment and discussed the potential impact upon buyers who suffer harm or loss as a result of purchasing, installing, and/or using cybersecurity products or services. Appropriately used information from 3 or more authoritative sources.Governance Frameworks Provided an excellent discussion of the role that standards and governance processes should play in ensuring that acquisitions and procurements (purchases) of cybersecurity products and services meet the buyers security requirements. Discussed specific governance process examples from COBIT,ITIL, and ISO/IEC 27002. Appropriately used information from 3 or more authoritative sources.Summary and Conclusions Provided an excellent summary and conclusions section which presented a summary of findings including 3 or more reasons why product liability (risk transfer) is a problem that must be addressed by both suppliers and purchasers of cybersecurity related products and services.Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.APA Formatting for Citations and Reference List Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.
Attachments:

You can leave a response, or trackback from your own site.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes