See attached. 2 Assignment Scenario: You have just been promoted to IT security manager at TechSecure Corp, a mid-size business that deals in the

See attached.

2

Assignment Scenario: You have just been promoted to IT security manager at TechSecure Corp, a mid-size business that deals in the development of financial software. A recent security threat to the company saw the leakage of some vital information of clients because of obsolete security measures in the System/Application Domain.

This breach convinced the executive team to order a review and redesign of the company’s compliance requirements for securing infrastructure and information security. Management has requested enhancements to improve the confidentiality, integrity, and availability of systems and applications. As a part of your responsibilities, you are required to develop and execute security measures to combat these problems.

Conduct an analysis of the current infrastructure and compliance requirements relevant to the System/Application Domain within TechSecure Corp’s IT infrastructure. Your analysis should include a review of applicable regulations and standards (e.g., GDPR, HIPAA, ISO/IEC 27001) that impact the company’s operations. Identify gaps between the current security measures and the compliance requirements. Make recommendations for achieving compliance, including necessary changes to policies, procedures, and technologies.

· How will you determine the common wide area network (WAN) equipment currently deployed in the WAN Domain? Explain the roles and functionalities that the WAN Domain should include. Explain industry best practices for maintaining WAN Domain compliance with relevant standards and regulations.

· Provide a summary of requirements for the local area network or LAN Domain configuration to ensure network reliability and performance. Explain industry best practices when creating documentation for planning security procedures. Include any legal requirements that apply.

· Provide instruction for developing a roadmap outlining the steps TechSecure Corp should take to meet the identified compliance requirements. This roadmap should include a timeline for implementing changes. Roles and responsibilities for key stakeholders. Key performance indicators (KPIs) to measure progress.

· Propose a vulnerability management strategy that addresses the confidentiality, integrity, and availability (C-I-A) of the company’s systems and applications. Your strategy should include methods for identifying, assessing, and prioritizing vulnerabilities within the System/Application Domain. Include approaches for mitigating or remediating identified vulnerabilities. Describe procedures for continuous monitoring and reporting on the security posture of systems and applications.

The assignment must be at least six pages. Use APA Style for citations and references. At least three scholarly sources from the CSU Online Library must be included.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper AHIMA 2018 Competency · III.7 Summarize standards for the exchange of health information Instructions: For this week 5 homework the focus was on Health Information Exchange (HIE). Summarize the standards for the exchange of HIE by writing one-page

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course

Computer Hardware & Software Project OBJECTIVES: Successful completion of this assignment demonstrates your understanding of the following course level outcomes: 1. Explain the functions of hardware, software, data, procedures, and people in a business computer system. 2. Identify the major hardware elements of a computer system and describe the purpose