Research Paper

Submit (300 to 400 words) research post for each part. All sources must be cited properly using APA formatting (At least 2).

Part 1)

Don't use plagiarized sources. Get Your Custom Essay on
Research Paper
From as low as $9/Page
Order Essay

There is a startup company called Extreme Unlimited, and they are in the process of hiring new employees due to recent demand for their product. Extreme Unlimited boasts that it can secure any organization with its array of cybersecurity products. However, in their rush to hire, their HR department does not require new employees to go through security awareness training. They assume since they are hiring cybersecurity professionals this step is not required.

What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?

Part 2)

Assessing risk begins with baselining, establishing a current state to get to the desired state. Progress is measured by meeting milestones and objectives, i.e. a maturing process. For example, the capability maturity model has the following framework:

1) Initial – informal

2) Documented Strategy & Principles – formalizing

3) Adaptive Security Architecture – well defined

4) Security Organization & Roadmap – optimized

5) Baseline Security Standards – quantitatively controlled

Give examples of risk at the level of these categories and how each level mitigates risks from the previous level?

Part 3)

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States. The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats?

How Do I Place an Order With a Paper Writing Service??

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your assignment order and pay for it with your credit card.
  • When the order is placed, we select a suitable expert writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download research paper preview. Satisfied with the research paper outcome? Press “Approve.”

Feel secure when using our writing service

It's important for every customer to feel safe. Thus, at The Homework Writings, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished assignment.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our homework writing services. Contact our support team. They are available 24\7.

Still thinking how to find a writer to boost my grades? Place your order on our website and get help with paper writing of your choice. We’ll meet your academic expectations.

Hire online writer Get a quote