100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

WGU D489 DEN1 Task 1: Cybersecurity Management Plan |Latest Update with Complete Solution

Rating
4.3
(3)
Sold
9
Pages
25
Uploaded on
16-04-2025
Written in
2024/2025

WGU D489 DEN1 TASK 1: Cybersecurity Management Plan |Latest Update with Complete Solution











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 16, 2025
Number of pages
25
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

1


WGU D489 DEN1 TASK 1: Cybersecurity Management
Plan |Latest Update with Complete Solution




DEN1 TASK 1: Cybersecurity Management Plan

STUDENT

College of Information Technology, Western Governors University

09/06/2024



SAGE..Books..Cybersecurity..Management..Plan



A. Summary..of..Gaps

Based..on..the..“Independent..Security..Report,”..the..following..gaps..exist..in..SAGE..Bo

oks’..security..framework:

1) Lack..of..Comprehensive..Security..Program:

a) The..security..program..does..not..follow..industry..best..practices..an

d..standards.

b) The..organization..lacks..acceptable..use,..mobile..devices,..secure..passwor

ds,..and..personally..identifiable..information..(PII)..protection..policies.

2) PCI..DSS..Compliance:

a) No..policies..or..procedures..for..handling..payment..card..data..following..P

CI..DSS..exist.

3) GDPR..Compliance:

a) No..measures..are..in..place..to..protect..the..PII..of..EU..citizens..per..GDPR.

, 2

4) Lacking..Security..Expertise:

a) The..current..information..security..team..needs..key..security..roles..t

o..implement..and..enforce..regulatory..compliance.

5) Cybersecurity..Awareness..Training:

a) Training..is..subpar,..infrequent,..and..does..not..align..with..PCI..DSS..and..NI

ST..best..practices.

6) Incident..Response..Plan..(IRP):
a) The..IRP..lacks..defined..roles..and..responsibilities..and..detailed..incide

nt..handling..and..analysis..procedures.

7) Business..Continuity..Plan..(BCP):

a) The..BCP..does..not..adequately..address..natural..disasters..and..lack

s..comprehensive..recovery..strategies.




B. Mitigation..Strategies

1) Develop..Comprehensive..Security..Policies:

a) Understand..the..requirements..of..PCI..DSS..and..GDPR..and..how..Sag

e..Books..should..handle..customer..data.

b) Conduct..a..risk..assessment..on..Sage..Books..to..evaluate..the..potential..ris

ks..to..cardholder..and..European..citizen..personal..data..(Webb,..2024).

c) Create..policies..that..align..with..PCI..DSS..and..GDPR,..which..are..cover

ed..below.

d) Include..acceptable..use,..mobile..device..policy,..secure..passwords,..and..P

II..protection.

2) PCI..DSS..Compliance..-

..This..consists..of..multiple..goals,..including..creating..a..secure..network,..protecti


ng..cardholder..data,..vulnerability..management,..access..control,..continuous..m

, 3

onitoring..and..auditing,..and..developing..security..policies..(PCI..Security..Stand

ards..Council,..2022).

a) Secure..Networks:

i) Implement..firewalls..to..protect..cardholder..data..using..access..contr

ol..lists,..security..appliances,..and..endpoint..protection..software.

ii) Change..system..defaults..where..necessary,..use..strong..cryptogra

phy,..and..maintain..an..inventory..of..all..assets..that..process..or..stor

e..cardholder..data.

b) Protect..Cardholder..Data:

i) Store..cardholder..data..using..robust..encryption..methods..and..ensur

e..Sage..Books..follows..data..retention..periods.

ii) Always..encrypt..the..transmission..of..cardholder..data..over..publi

c..networks.

c) Vulnerability..Management:

i) Deploy..anti-

virus..software..to..protect..systems..against..malware..and..regularly..

update..and..audit..anti-

virus..software..to..ensure..it..is..still..functioning..as..intended.

ii) Establish..a..vulnerability..management..process..to..triage..an

d..remediate..vulnerabilities..promptly.

d) Access..Control:

i) Use..least..privilege..principles..to..restrict..access..to..sensitiv

e..cardholder..data..only..to..people..and..systems..needing..it

.

ii) Use..multifactor..authentication..and..robust..cryptographi

c..transmissions..for..access..to..administrative..functions.
$16.99
Get access to the full document:
Purchased by 9 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 3 reviews
5 months ago

7 months ago

7 months ago

4.3

3 reviews

5
2
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
professoraxel Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
2356
Member since
3 year
Number of followers
1567
Documents
19278
Last sold
6 hours ago
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

445 reviews

5
207
4
79
3
85
2
24
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions