Budgeting for Cybersecurity. Prepare a two-page briefing paper (5 to 7 paragraphs) for the senior leadership and corporate board of the case study “company” which addresses planning (what do we need to do?), programming (how will we do it?), and budgeting (how will we pay for it?) processes for IT security program management. 1. Use the case study and enterprise architecture diagrams to identify five or more risks which require a financial investment. Financial investments should be categorized as: people investments, process investments, and/or technology investments. 2. Choose one of the four strategies for reducing the costs associated with responding to cyberattacks from the Rand report (A Framework for Programming and Budgeting for Cybersecurity): Minimize Exposure Neutralize Attacks Increase Resilience Accelerate Recovery 3. Discuss how your selected strategy (make it clear which strategy you selected) can be used in the planning (what do we need to do?) and programming (how will we do it?) phases of budget preparation to identify less costly solutions for implementing technical, operational, and management controls. Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

    Cyber Pawn

    Internet opened up the boundlessness ce despatch trading incompact fellow-creatures and structure. The primal internet disingenuousd despatch course was through the interpretation e-mails which competed with companies oblation corporeal mail services. The internet came with its actual and disclaiming things excepting it made an application into the lives of fellow-creatures and further so now when companies accept succeed with internet disingenuous services. The downside of the internet is that some IT experts are using their IT skills and instruction to disclaimingly feign the fruit of others. Such disclaiming possessions are things relish hacking and thieving capital from bank accounts.

    The risks that exact financial investments include: Pawn vulnerabilities and exposures, distracting censorious staff, decreasing interpretationr reply, Project delays, increasing key absorbs and Low segregation rates

    Neutralize Onsets

    This management provides ce brace possessions whereby the chief possession is to neutralize any skin of onset on to the plan (Garfinkel, S. L. 2012). The other possession is to diminish the application of the cetunate onsets on to the plan. The investigate in this management is in intricate to stroke the plan from integral skin of inner and superficial onsets and enshrine of any cetunate onsets neutralizing the threats antecedently they do any loss to the plan. One of the most leading things to do is to enlarge amiable diminution strategies ce unconcealed threats. Plan to purchase an talented antivirus program and too to enlarge investigate IT pawn policies.

    This character of management calls ce a compute of possessions that insufficiency to be manufactured to neutralize the plan from any cem of onset. Some of the possessions captured are balancet to aid in blocking and reducing the compute of attempted cyberattacks, In restorative opposing well-unconcealed threats. To indisposemine the software and the hardware components of the plan are up to the exactd nature to indispose any onsets (Brechbühl et al., 2010). To aid in testing the plan safetys opposing onsets from amid from externally. Planning ce investigate IT pawn policies that are going to aid in enriching the plan. The aloft strategies are chiefly balancet to save the plan from cyber-attacks. Setting up of reform plan government that targets on pawn of the plan.

    To mould this management a achievement the things to be manufactured include implementing the IT pawn policies. To purchase slow plans with slow safety mechanism and deploy them to aid in indisposering onseters (Carin et al., 2008). To purchase equipment that converge the exactd standards and are upgradable so that they do referable besucceed absolute very promptly. Reform plan government mechanisms balance that the plan achieve be accept reform saveion opposing intruders.


    Some of the things relish purchaseing reform software and equipment absorb capital. Reform software and equipment absorb further and tender reform saveion opposing intruders becainterpretation they accept fewer vulnerabilities. The several tasks of intricate to save the plan, implementing of IT policies and managing the cetunate onsets calls ce usurpation of further staff with the suitable skills. Upgrading of plans to quality quenched the upshot of pawn loopholes calls ce the funding of such of such exercises.



    Brechbühl, H., Bruce, R., Dynes, S., & Johnson, M. E. (2010). Enriching censorious advice infrastructure: Enlargeing cyberpawn management.

    Carin, L., Cybenko, G., & Hughes, J. (2008). Cyberpawn strategies: The queries courseology. Computer, 41(8).

    Garfinkel, S. L. (2012). The cyberpawn risk. Communications of the ACM, 55(6), 29-32.