Cybersecurity Policies - Assignment 2: Defining and Implementing Security Metrics

Instructor: Matt McClintock
If you have a Study.com College Accelerator membership and are seeking college credit for this course, you must submit an assignment and pass the proctored final exam. You must submit your assignment before registering for the final. Below you will find prompts and instructions for submitting your assignment.

About this Assignment

Cybersecurity references the protection of sensitive information, specifically that which is stored or accessed via the Internet. Cybersecurity is important for protecting personal information for both individuals, and for large that hold this sensitive information. For companies store sensitive information on their clients, it's essential that they have a robust and measured cybersecurity program. A metrics program is critical in measuring how successful an organization is in protecting its assets.

For this final assignment, you will write a 1,500-1,800 word paper outlining a security metrics program for a business that provides financial services to clients. It should focus on what security metrics are, why they are needed, and how they can be implemented. You should identify key performance indicators (KPIs) that can be measured and then develop a security metrics measurement plan with metric thresholds and resultant actions should metrics not be met.

Scenario

You have just acquired GrowMyMoney.com and are excited to start taking on new clients. In a request for proposal (RFP) you received from a Fortune 500 CFO, he asked you to outline your security metrics program and explain how it is implemented. You couldn't answer this question, and as a result, you lost the business. You are now sweating as you realize how much money you just forfeit the company! To address this challenge, you have hired a new Chief Information Security Officer (CISO) and his first directive is to collaborate with you to create this program. In it you need to define the what, why, and how of cybersecurity metrics. In addition, you need to define KPIs that measure success and outline what will happen if these metrics are not met. Another RFP has just arrived so time is of the essence!

Formatting & Sources

Please write your paper in the MLA format. You may refer to the course material for supporting evidence, but you must also use 3 other sources and cite them using the MLA format. Please include a mix of both primary and secondary sources, with at least one source from a security journal. If you use any Study.com lessons as sources, please also cite them in MLA (including the lesson title and instructor's name).

  • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
  • Secondary sources come from peer-reviewed scholarly journals, such as the Oxford Academic Journal of Cybersecurity. You may use sources like JSTOR or Google Scholar to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

If you're unsure about how to use the MLA format to cite your sources, please see the following lessons:

Grading Rubric

Your essay will be graded based on the following rubric:

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create An Account
Support