Follow the attach instructions to complete this work. Budgeting for Cybersecurity   You will start by writing a short paper as

 Follow the attach instructions to complete this work.

Budgeting for Cybersecurity

 

You will start by writing a short paper as described in the discussion question. You will be using information from this week’s readings and from your own research to address the information needs expressed in the question. Create an MS Word document containing your “short paper” (response) for the discussion topic. Use MS Word to spell check and grammar check your work!

Choose 
one of the following strategies for reducing the costs associated with responding to cyberattacks from the Rand Report* (
A Framework for Programming and Budgeting for Cybersecurity):

·     Minimize Exposure

·     Neutralize Attacks

·     Increase Resilience

·     Accelerate Recovery

Then, prepare a two-page briefing paper (5 to 7 paragraphs) for the Red Clay senior leadership and Red Clay corporate board that addresses planning, programming, and budgeting processes for your strategy. Your audience is the company’s IT Security Working group and includes both technical and non-technical managers and senior staff members responsible for budgeting. The general questions that this audience is interested in are:

· Planning: What will we do? (your chosen cybersecurity strategy)

· Programming: How and when will we do it?

· Budgeting: How much will it cost and how will we pay for it?

Remember to keep your focus on the 
processes related to planning, programming, and budgeting, not the actual hardware, software, etc. that needs to be acquired and paid for. You may, however, provide examples of hardware or software.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

*Rand Report: Davis, J. S., Libicki, M. C., Johnson, S. E., Kumar, J., Watson, M., & Karode, A. (2016).
 

A framework for programming and budgeting for cybersecurity

 (Rand TL-168). Retrieved from 

Rubrics

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to another application. An interrupt occurs. Block the current application. Data transfer for the current application completes. Transfer execution from another application back to the kernel in kernel mode. this are the option give me the

Project 1: Develop Cloud Migration Plan  Step 4: Install AWS Application Discovery Agent  At this point in the migration planning process, you’ve

Project 1: Develop Cloud Migration Plan  Step 4: Install AWS Application Discovery Agent  At this point in the migration planning process, you’ve considered premigration issues, reviewed premigration assessment tools, and familiarized yourself with AWS Application Discovery Services. You are now ready to install and test the AWS Application Discovery Agent.

Discussion: Evaluation of AWS Application Discovery Service

Discussion: Evaluation of AWS Application Discovery Service Contains unread posts Now that you have discussed the data migration and application migration strategies, you will discuss and evaluate AWS Application Discovery Service. You should ensure that you cover the following areas: · What is agent-based discovery? · What is agentless discovery?