Cybersecurity principles.

 

 

Submit a 2-page status report that includes research conducted for the project that outlines cybersecurity principles. Also, describe the tasks completed in this milestone in an updated work breakdown structure (WBS), in Excel, Word, or Project, showing the actual time it took to complete each task. Finally, describe lessons learned while implementing this milestone. In addition, demonstrate that the milestone is fully completed by showing sufficient evidence. Depending on the project, the evidence can take the form of research findings, diagrams, designs, screenshots, databases, queries, source code, configurations, videos, policies, etc. Your evidence should result in at least 5 pages. This is in addition to your 2-page status report. If your evidence is in the form of videos, the videos should be at least 8–10 minutes long. This is only for your evidence.

Sample Question

Cybersecurity Principles Project: Milestone 1 Status Report

Date: July 5, 2024

Project: Cybersecurity Principles Research and Analysis

1. Project Overview

This milestone focused on conducting thorough research into fundamental cybersecurity principles. The research aimed to establish a strong foundation for subsequent project phases, including the development of cybersecurity policies, implementation strategies, and training programs.

2. Research Findings

Research conducted during this milestone covered a wide range of cybersecurity principles, including:

  • Confidentiality: Protecting sensitive information from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes implementing measures such as encryption, access controls, and data loss prevention techniques.  
  • Integrity: Ensuring the accuracy and completeness of information and systems. This involves protecting data from unauthorized modification or deletion, and ensuring the authenticity of data sources.
  • Availability: Ensuring that systems and data are accessible and usable when needed. This includes implementing measures to prevent service disruptions and ensure business continuity.  
  • Authentication: Verifying the identity of users and devices before granting access to systems and data. This helps to prevent unauthorized access and maintain data integrity.
  • Authorization: Controlling the actions and permissions of users within a system. This ensures that users have the necessary access rights to perform their job functions while preventing unauthorized access to sensitive information.
  • Least Privilege: Granting users only the minimum level of access necessary to perform their job duties. This principle helps to minimize the potential impact of a security breach.
  • Defense in Depth: Implementing multiple layers of security controls to provide comprehensive protection against cyber threats. This includes a combination of technical, administrative, and physical security measures.
  • Risk Management: Identifying, assessing, and mitigating cybersecurity risks. This involves conducting regular risk assessments, implementing appropriate security controls, and developing incident response plans.

3. Completed Tasks (WBS & Actual Time)

Task ID Task Description Actual Time (Hours)
1.1 Literature Review on Cybersecurity Principles 15
1.2 Research on Industry Best Practices 10
1.3 Analysis of Relevant Standards (e.g., NIST) 8
1.4 Documentation of Research Findings 5

4. Lessons Learned

  • The importance of thorough research: The research phase proved to be more time-consuming than initially anticipated. Thorough research is crucial to ensure a comprehensive understanding of cybersecurity principles.
  • The value of collaboration: Collaboration with cybersecurity experts and other stakeholders can provide valuable insights and perspectives.
  • The importance of staying updated: The cybersecurity landscape is constantly evolving. Continuous learning and adaptation are essential to stay abreast of the latest threats and best practices.

5. Evidence of Milestone Completion:

  • Research Documentation:
    • [Include links to or attachments of research papers, white papers, and other relevant documents.]
  • Summary of Findings:
    • [Include a comprehensive summary of research findings, including key concepts, definitions, and best practices.]
  • Analysis of Industry Standards:
    • [Include an analysis of relevant industry standards, such as NIST Cybersecurity Framework, ISO 27001, and others.]

This question has been answered.

Get Answer