Please help me with my cybersecurity question

Question # 00576645
Subject: Computer Science
Due on: 09/18/2017
Posted On: 09/18/2017 02:29 AM
Tutorials: 0
Rating:
4.9/5
Question Dot Image
Step 1: Develop Functional Requirements for Videoconferencing

The first step in your proposal for a secure videoconferencing system is to develop a set of functional requirements for videoconferencing that you believe the media company will need based on its geographic dispersion and business needs.

In developing those requirements, research three videoconferencing solutions such as Skype, GotoMeeting, Polycom, and Cisco Webex and explain their capabilities, advantages, and disadvantages. Identify costs as well as implementation and support requirements.

The functional requirements and the three possible solutions will be a section of your Proposal for Secure Videoconferencing. In the next step, you will review the challenges of implementing those solutions.


Step 2: Discuss Implementation Challenges

In the previous step, you outlined the requirements for secure videoconferencing for the company and outlined three potential solutions. Part of your final proposal should also include the advantages and disadvantages of the implementation options for the three systems you selected. This section of the proposal also must include the changes the media company will need to make to implement the systems.

Additionally, explain how system administration or privileged identity management will operate with these systems. You will also need to examine how data exfiltration will occur with each of the new systems.

The changes to the systems and challenges for the implementation of these potential solutions will be an important section of your Proposal for Secure Videoconferencing. In the next step, you will take a closer look at the track records of each of the potential videoconferencing vendors.


Step 3: Identify Vendor Risks

You've finished outlining the pros and cons of three videoconferencing systems. Now, it's time to take a close look at how they serve their clients. This will take some research. Look at the systems' known vulnerabilities and exploits. Examine and explain the past history of each vendor with normal notification timelines, release of patches, or work-arounds (solutions within the system without using a patch). Your goal is to know the timeliness of response with each company in helping customers stay secure.

This step will be a section of your Proposal for Secure Videoconferencing.

In the next step, you will outline best practices for secure videoconferencing that will be part of your overall proposal to management.


Step 4: Develop Best Practices for Secure Videoconferencing

The last few steps have been devoted to analyzing potential videoconferencing solutions. But obtaining a trusted vendor is just part of the security efforts. Another important step is to ensure that users and system administrators conduct the company's videoconferencing in a secure manner. In this step, outline security best practices for videoconferencing that you would like users and systems administrators to follow. Discuss how these best practices will improve security and minimize risks of data exfiltration as well as snooping.

This "best practices" section will be part of the overall Proposal for Secure Videoconferencing.

Step 5: Submit Your Proposal for Secure Videoconferencing and All Related Materials

It's time to prepare your materials on secure videoconferencing for management. Your task is to recommend a system that best meets the business functionality and security requirements of the company. As part of that recommendation, you will also prepare a set of high-level executive briefing slides to give the CEO and CIO an overview of your study.

The assignments for this project are as follows:

  1. Executive briefing: This is a three- to five-slide visual presentation for business executives and board members.
  2. Executive summary: This is a one-page summary at the beginning of your Proposal for Secure Videoconferencing.
  3. Proposal for Secure Videoconferencing: Your report should be a minimum six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
  4. Lab report: Generated from Workspace.

Submit all four components to the assignment folder.


Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
  • 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
  • 1.4: Tailor communications to the audience.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 1.6: Follow conventions of Standard Written English.
  • 1.7: Create neat and professional looking documents appropriate for the project.
  • 1.8: Create clear oral messages.
  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 2.4: Consider and analyze information in context to the issue or problem.
  • 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
  • 5.6: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology.
  • 5.7: Apply proven methods to secure telecommunications media, transmission, and protocol.
  • 6.3: Specify security solutions based on knowledge of principles, procedures, & tools of data mgmt, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, & data standardization processes.
  • 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
  • 7.4: Knowledge of policies, processes, & technologies used to create a balanced approach to identifying and assessing risks to information assets, personnel, facilities, & equipment, and to manage affordable mitigation strategies that meet security needs.
  • 8.6: Provides professional preparation for computer digital forensics, investigation of crime, and preservation of digital evidence in criminal and civil investigations and information security incident response.
  • 9.4: Manages and supports the acquisition life cycle and cybersecurity products used in the organization’s design, development, and maintenance of its infrastructure to minimize potential risks and vulnerabilities.
Dot Image
cyber18 Posted By :
Questions: 2 Tutorials: 0

Click chat button below to get the answer.

Related Questions
Capella IT4990 Complete Course Latest 2022 November (Full)
IT4990 Information Technology Capstone Project Unit 1 Discussion Team Discussion: Prepare to Create the Team Charter Review the Team Charter Template and review the team information provided …
Capella IT4990 Assignments Latest 2022 November (Full)
IT4990 Information Technology Capstone Project Unit 1 Assignment Develop a Team Charter By successfully completing this assignment, you will demonstrate your proficiency in the following cou …
Capella IT4990 Unit 10 Assignment 2 Latest 2022 November
IT4990 Information Technology Capstone Project Unit 10 Assignment 2 Professional Development Plan By successfully completing this assignment, you will demonstrate your proficiency in the foll …
Capella IT4990 Unit 10 Assignment 1 Latest 2022 November
IT4990 Information Technology Capstone Project Unit 10 Assignment 1 Final Project Report By successfully completing this assignment, you will demonstrate your proficiency in the following cou …
Capella IT4990 Unit 9 Assignment Latest 2022 November
IT4990 Information Technology Capstone Project Unit 9 Assignment Presentation to Industry Client By successfully completing this assignment, you will demonstrate your proficiency in the foll …
Capella IT4990 Unit 7 Assignment Latest 2022 November
IT4990 Information Technology Capstone Project Unit 7 Assignment Initial Draft of Project Report By successfully completing this assignment, you will demonstrate your proficiency in the foll …
Capella IT4990 Unit 5 Assignment Latest 2022 November
IT4990 Information Technology Capstone Project Unit 5 Assignment Preliminary IT Solutions or Recommendations By successfully completing this assignment, you will demonstrate your proficiency …
Capella IT4990 Unit 2 Assignment Latest 2022 November
IT4990 Information Technology Capstone Project Unit 2 Assignment Project Plan and Deliverables By successfully completing this assignment, you will demonstrate your proficiency in the follow …
Capella IT4990 Unit 1 Assignment Latest 2022 November
IT4990 Information Technology Capstone Project Unit 1 Assignment Develop a Team Charter By successfully completing this assignment, you will demonstrate your proficiency in the following cou …
Capella IT4990 Unit 1 Discussion Latest 2022 November
IT4990 Information Technology Capstone Project Unit 1 Discussion Team Discussion: Prepare to Create the Team Charter Review the Team Charter Template and review the team information provided …
Recent Questions
Aspen N508 Complete Course Latest 2024
N508 Theory and Research Module 1 Discussion Why is a literature review an important part of the planning phase?  What impact should the literature have on current research?   N …
Aspen N508 All Assignments Latest 2024
N508 Theory and Research Module 1 Assignment Based on what you have learned so far this week, create a PowerPoint presentation with detailed notes for each slide that addresses each of the follo …
Aspen N508 Module 8 Assignment Latest 2024
N508 Theory and Research Module 8 Assignment Signature Assignment: Presentation A nurse on the research and practice committee is preparing for an update on evidence-based practice (EBP). The …
Aspen N508 Module 7 Assignment Latest 2024
N508 Theory and Research Module 7 Assignment Based on what you have learned so far this week, create a PowerPoint presentation with detailed notes for each slide that addresses each of the follo …
Aspen N508 Module 6 Assignment Latest 2024
N508 Theory and Research Module 6 Assignment This week's assignment was the following: Locate a nursing study that examines the effects of an intervention. Provide a summary of the study, …
Aspen N508 Module 5 Assignment Latest 2024
N508 Theory and Research Module 5 Assignment This week's assignment was the following: Based on what you have learned so far this week, create a PowerPoint presentation with detailed note …
Aspen N508 Module 4 Assignment Latest 2024
N508 Theory and Research Module 4 Assignment This week's assignment was the following: Visit the PRIME nursing website and review the case study titled “Stress Management for Patien …
Aspen N508 Module 3 Assignment Latest 2024
N508 Theory and Research Module 3 Assignment This week's assignment was the following: Based on what you have learned so far this week, create a PowerPoint presentation with detailed note …
Aspen N508 Module 2 Assignment Latest 2024
N508 Theory and Research Module 2 Assignment Complete a concept analysis on one of the following topics. Utilize the Overcoming concept analysis as an example. This part of the assignment should …
Aspen N508 Module 1 Assignment Latest 2024
N508 Theory and Research Module 1 Assignment Based on what you have learned so far this week, create a PowerPoint presentation with detailed notes for each slide that addresses each of the follo …