See attach
Your research and your Workspace exercise have led you to this moment: creating your SAR and RAR. Consider what you have learned in the previous steps as you create your reports for leadership.
Prepare a Security Assessment Report (SAR) with the following sections:
1. Purpose
2. Organization
3. Scope
4. Methodology
5. Data
6. Results
7. Findings
The final SAR does not have to stay within this framework and can be designed to fulfill the goal of the security assessment.
Prepare a risk assessment report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation.
Devise a high-level plan of action with interim milestones (POAM) in a system methodology to remedy your findings.
Include this high-level plan in the RAR.
1. Security Assessment Report (SAR): This should be an eight- to 10-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Must include a data
Data Breach, Enterprise Network Design with a diagram ,
Enterprise Threats,
2. Risk Assessment Report (RAR): This report should be a five- to six-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Submit your deliverables after reading the instructions below.
Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
· 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
· 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
· 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
· 1.4: Tailor communications to the audience.
· 1.5: Use sentence structure appropriate to the task, message and audience.
· 1.6: Follow conventions of Standard Written English.
· 5.2: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system’s internal operations and interactions with other systems and knowledge of standards that either are compliant with or derived from established standards or guidelines.
· 5.6: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology.
· 7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
· 8.1: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
· 8.2: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence approporiately.