Development Stage (Erikson): Give the stage and rationale for your evaluation|My course tutor

Posted: March 6th, 2023

 

 

Don't use plagiarized sources. Get Your Custom Essay on
Development Stage (Erikson): Give the stage and rationale for your evaluation|My course tutor
Just from $13/Page
Order Essay

 

 

 

 

 

Nursing Diagnosis

Problem statement (NANDA diagnosis):

 

Related to (What is happening in the body to cause the issue?):

 

As evidenced by (Specific symptoms):

 

 

SOLUTION

 

Step 8: Submit IT Operations and Risk Management Briefing

 

 

As a synthesis of all prior steps in this project, you will now develop and submit the first component of your deliverable to your CISO: the  Cyber Operations and Risk Management Briefing. The briefing will consist of a written evaluation and video presentation. Each team member should develop his or her own briefing and submit independently. You may, however, use your team’s discussion area to share your findings with your peers. Refer to the  CISO Deliverable Overview for a full list of requirements for the briefing.

Research and evaluate the maintenance requirements for each option identified in the software development matrix you submitted in the previous step. What resources and processes are required for each option? You should also address the schedule to implement the recommended software and identify any potential impacts to the mission, any vulnerabilities or risks, and the likelihood of success.

Your video presentation should brief organizational stakeholders on your research, evaluation of alternatives, and recommendations.

Submit your briefing for review and feedback.

To submit your briefing:

· Follow the instructions below to submit the written portion of your briefing.

· How to submit the video: To submit the video, you may either upload it to OneDrive using your UMGC account or upload it to a video-sharing service. Once you have uploaded the video, copy the link and include it in a document or in the assignment folder.

Now that you have completed the briefing and video, it’s time to turn back to the situational reports that you and your team have been compiling for the CISO.

 

 

 

 

 

 

 

Course Resource

Print

CISO Deliverable Overview

This document contains full details for each final assignment to be assessed, as well as guidelines for video submissions.

As a synthesis of prior steps and interim submissions, you will be assessed on the following assignments:

1. Cyber Operations and Risk Management Briefing

2. Intelligence Debriefing

3. Lessons Learned Video Presentation

4. Next Steps for the Computer Security Incident Response

1. Cyber Operations and Risk Management Briefing

Using the Software Development Life Cycle Assessment and Software Development Matrix you create during the project, you will develop a  Cyber Operations and Risk Management Briefing for your nation’s CISO and other stakeholders. The briefing will consist of a written evaluation and video presentation. The briefing should include each of the following items:

· identification of the software assurance needs and expectations of the organization

· description of the key attributes of the current software development life cycle (SDLC)

· identification of any known supply chain risks

· identification of vulnerabilities in the existing software used

· identification of software options that could meet the organization’s needs

· evaluation of software options and recommendation(s) for your organization, with each supported by a rationale

· evaluation of supply chain options and recommendation(s) for your organization, with each supported by a rationale

· explanation of the costs involved in your recommendations

· recommendations for contract language that would be used to ensure that supply chain, system, network, and operational security were met

Use the dropbox to submit the written portion of your briefing.

To submit your briefing:

· Use the dropbox to submit the written portion of your briefing.

· How to submit the video: To submit the video, you may either upload it to your OneDrive using your UMGC account, or upload it to a video-sharing service. Once you have uploaded the video, copy the link and include it in a document or in the dropbox text field.

2. Intelligence Debriefing

Using the Business Continuity Plan and Situation Reports you created throughout the project, you will create an  Intelligence Debriefing and a  Lessons Learned Video Presentation to share with your CISO.

This report will be from all information from all events that occurred during the summit. In the report, it will detail all technical information that was derived and any linkage to impacted systems identified in the BCP, possible methods of intrusion, and if events can be linked to one another. Write eight to 10 pages describing the events throughout the summit and all indicators shared by fellow nations. Determine what the malware types were and how they can be discovered in the future, and how they can be mitigated whether by detection systems or simply by having end users take awareness training.

Items below are required in the report for technical staff.

· current system standings

· modifications that can be made to stop this style of threat until a patch is created

· reputation and brand damage

· lost productivity due to downtime or system performance

· system availability problems

· determining root causes

· technical support to restore systems

· compliance and regulatory failure costs

3. Lessons Learned Video Presentation

As a synthesis of the prior steps in the project, you will create a  lessons learned video presentation to share with your CISO.

Create a five- to 10-minute video/PowerPoint voice recording that would be presented to the CISO and the nation’s leader concerning attacks, evidence acquired, attribution, impact, business recovery, and remediation success. Areas that should be discussed are defined below.

Use this opportunity to describe not only what occurred during the attack and the results of evidence items but also how operations and communications can be done in a secure fashion. Also describe the need for information sharing and how it can be possible between nations and private business operations without source attribution. Is source attribution needed?

Use this opportunity for any lessons learned throughout the project that IT staff can take back to business units to incorporate into daily operations. Recall the threats you received. If you were the leader of the group, what would you want the CISO to know in case of an event? What could have been identified earlier as a critical system that may have been protected? Also, take a look back at your team’s BCP and discover any setbacks that may happen once an event occurs. Describe any additions or changes that you would incorporate in the plan. Describe the following information in your video at a minimum and additional topics that could better the operational tempo of business units.

Recovery: How the incident was contained and eradicated

· The work performed during recovery

· Areas where the incident response team was effective

· Areas that need improvement

· Which security controls failed (including monitoring tools)?

· How can we improve those controls?

· How can we improve the security awareness programs?

· What were the current operating system vulnerabilities that were leveraged to execute the attack?

· How can managing patches and basic operating system security enhance security from known threats?

To submit the video: You may either upload the video to OneDrive using your UMGC account, or upload it to a video-sharing service. Once you have uploaded the video, include the link in a document and submit it using the dropbox provided.

4. Next Steps for the Computer Security Incident Response

Written recommendations based on the results of an incident response investigation need to be developed to support the organization’s security assessment and training efforts. Your team needs to further develop your recommended “next steps” (from Step 10, SITREP 3). Your deliverable will be to write a report on malware, encryption, ransomware, and communications and network security to inform the CISO and CISO staff about the next steps that should be taken.

Your deliverable will be an assessment that consists of explanatory material to aid organizational leadership in understanding malware and system infections, and the investigative report that summarizes findings from the SITREP to substantiate whether a specific incident qualifies as ransomware. The report documents what is known about the Reveton malware and should provide concrete steps for protecting the organization and its computer systems from future attacks.

 

© 2023 University of Maryland Global Campus

All links to external sites were verified at the time of publication. U

 

Project 3, Step 7: Business Continuity Plan

 

Team United Kingdom: Michael Arizieh, Julian Chandler, Justin Basagic, Ayman Gismalla Mohammed, Oluwasegun “Saji” Ijiyemi

University of Maryland Global Campus

CMP 670 9047 Capstone in Cybersecurity (2231)

Prof. Thaddeus Janicki

Feb 25, 2023

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table of Contents

 

Table of Contents………………………………………………………………………………………………..……………………..2

Introduction………………………………………………………………………………………………………..……………………..3

Development Methodologies…………………………………………………………………..……………..………………….3

Phases of Software Life Cycle………………………………………………………………………………..……………………5

Software Development Matrix….………………………………………………………………………………..………………7

Ad-Hoc Wireless Network………………………………………………………………………………………………..………..9

Ransomware Preparation…………………………………………………………………………………………………..………9

Incident Response Plan……………………………………………………………………………………………………………..10

Conclusion………………………………………………………………………………………………………………………………..12

References……………………………………………………………………………………………………………………………….13

 

 

 

 

 

 

 

 

 

 

Introduction

The process, procedures, or phases used to create a model for the development of software or/and its life cycle management are referred to as a software development life cycle (SDLC). It includes all of the early phases, including analysis and model creation, through to the software’s ultimate implementation and the ensuing post-development management process, including assessment and testing. Every software’s intended ultimate purpose is taken into account during development. There is a lot of processing and computing involved in the actual development of the software. Hence, a process overview document defining the process’s scope and complexity is required. By doing this, it is made sure that the finished software is highly reliable and functions as planned.

Development Methodologies

Software development approaches for common software come in a variety of forms. Different businesses must utilize different approaches, however in order to implement software successfully, a company must follow a standardized software development methodology. The various kinds of software models include:

There are six phases to the widely used waterfall software development paradigm, which is distinguished by not returning to a stage from earlier in the process. It might not be possible to complete each phase independently in practice. But, it is possible—and even necessary—to go back and redo earlier processes if the functional requirements have changed or if there is a need for improvement. As a result, the waterfall model’s foundation has been used to build additional life cycle models. The waterfall approach is widely employed in real-world situations, especially when creating large-scale business software systems. Its application can be traced back to the industrial industry’s software development procedures.

Agile software development has benefits and drawbacks, but one benefit is that a model of the system is available early on, making it simpler to identify any functional or design faults. In order to satisfy clients, this also takes into account their requirements. Likewise, like other approaches, it takes into account the needs, suggestions, and project satisfaction of the client. The primary distinction is that the agile development method does not explicitly identify the software’s final product from the beginning.

The waterfall and extreme programming development go hand in hand. However, the stages are shorter than usual because the software engineers concentrate primarily on one key component of the software system at a time.

The SDLC version known as rapid application development is not recommended for building complicated apps that will process large numbers of transactions. This is because the FFIEC’s methodology requires a software procedure that could take 30 to 90 days to complete.

Phases of the Software Life Cycle

The following steps are included in the seven-step software development life cycle:

Define the project. The project’s concept must be explained in the first phase. It entails defending the project’s need as well as outlining the goals it seeks to achieve. This phase involves conducting a feasibility study to identify the project’s objectives and how they will be achieved.

Defined user needs. The intended use and features of the software are defined in the second stage of the SDLC. In order to build features to be incorporated in the graphical user interface, such as screen layouts, business rules, process diagrams, pseudocode, and other documentation, it is early in the process and should involve consulting the end user.

Definition of system requirements. The third phase in the SDLC for project scope definition

SOLUTION

 

Given the patient’s complex medical history and multiple comorbidities, a comprehensive nursing care plan would need to address all of the patient’s underlying conditions while also addressing the immediate concerns related to the patient’s current admission. The nursing care plan may include interventions to manage the patient’s medications, monitor and manage fluid and electrolyte imbalances, prevent and manage infections, promote respiratory function, and provide support for the patient’s mental health needs.

.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00