Task/DDN1 Task 3 Latest 2024 with complete
solution
D490
,WGU D490;MSCSIA Capstone Final
Task/DDN1 Task 3 Latest 2024 with complete
solution
Building an Information Security Program: One Critical Control at a Time
A Capstone Presented to the Information Technology College Faculty
of Western Governors University
in Partial Fulfillment of the Requirements for the Degree
Master of Science in Cyber Security and Information
Assurance
, Abstract
Organizations, like Red River Management Partners (RRMP), through accelerated
expansion and growth due to aggressive company mergers and acquisitions, have a
responsibility to its customers, outside partnerships, and employees to provide a methodology of
culpability and integrity. RRMP is a privately owned international enterprise focused on three
areas of business: Property Management with a management portfolio of 400,000 units,
Construction & Development, and Investments. RRMP is the leader in the multi-family
management industry, but they lack network visibility which leaves the organization vulnerable
to malware, cyber- intrusions, or corporate espionage. More importantly, documented security
controls, policies, and procedures are non-existent. To help mitigate these risks, RRMP will
develop a security framework based on the Center for Internet Security (CIS) Critical Security
Controls for Effective Cyber Defense principles.
The research methodology will include a security audit and vulnerability assessment of
the existing network. The audits will help identify internal and external threats, as well as,
network vulnerabilities. The security framework will be implemented in three phases:
• Phase 1: Implement inventory control application
• Phase 2: Implement vulnerability scanning tools/account management control
• Phase 3: Implement event management and anomaly detection
The expected outcome for RRMP has improved incident response, classification and
defining security incidents, handling of security incidents, and standardization of a security
posture within RRMP. In addition, RRMP will gain improved visibility into the network
through the implementation of network monitoring and vulnerability assessment tools. This will
allow them to have a proactive strategy in their security defenses rather than reactive one.
Finally, RRMP will improve their security posture by knowing what devices or software are on
their
, network using inventory control management software. This centralized software solution will
provide the Information Technology (I.T.) staff a visual representation and offer reports of all
devices recently connected to the network. Used in conjunction with each other, these tools will
provide a holistic, and foundational, network solution to ensure security protocols can be
implemented easily in the future.