Thanks in advance

Assignment assistance needed. Everything that is needed has been
uploaded. Please refer to uploaded Instructions. Thanks in advance.

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Thanks in advance
Just from $13/Page
Order Essay

The assignments for this project are as follows:
1. Executive briefing: This is a three- to five-slide visual presentation for business executives and
board members.
2. Executive summary: This is a one-page summary at the beginning of your report.
3. Cybersecurity System Security Report for Successful Acquisition: Your report should be a
minimum 12-page double-spaced Word document with citations in APA format. The page
count does not include figures, diagrams, tables or citations.
Step 1: Conduct a Policy Gap Analysis
As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep
in mind that the networks of companies going through an M&A can be subject to cyberattack. As you
work through this step and the others, keep these questions in mind:
Are companies going through an M&A prone to more attacks or more focused attacks?
If so, what is the appropriate course of action?
Should the M&A activities be kept confidential?
Now, look at the existing security policies in regard to the acquisition of the media streaming company.
You have to explain to the executives that before any systems are integrated, their security policies will
need to be reviewed.
Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry
standards as well as local, state, and national laws and regulations. In other words, you need to make
sure the new company will not inherit any statutory or regulatory noncompliance from either of the two
original companies. This step would also identify what, if any, laws and regulations the target company
is subject to. If those are different from the laws and regulations the acquiring company is subject to,
then this document should answer the following questions:
How would you identify the differences?
How would you learn about the relevant laws and regulations?
How would you ensure compliance with those laws and regulations?
The streaming company that is being acquired has a current customer base of 150,000 users, who on
average pay $14.99 in monthly fees. Based on the overall income, use PCI Standards DSS 12
requirements, and the PCI DSS Quick Reference Guide to identify a secure strategy, and operating
system protections to protect the credit card data.
Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and
explain how the controls should be implemented, how they will change the current network, and any
costs associated with implementing the change.
In the next step, you will review the streaming protocols that the companies are using.
Step 2: Review Protocols for Streaming Services
After reviewing the policies from the company and the policy gap analysis, the M&A leader asks you
about the protocols used by the streaming company. He wants to know if the protocols used would
affect the current state of cybersecurity within the current company environment. For this section,
review the protocols, explain how they work along with any known vulnerabilities, and how to secure
the company from cyberattacks. Start with researching the commonly known streaming protocols and
the vulnerabilities of those protocols. Some examples are the Real-Time Streaming Protocol (RTSP),
Real-Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).
Additionally, the leadership wants to know if any vulnerabilities identified would or could lead to a no-go
on the M&A.
In other words:
1. You need to identify what streaming the companies are doing and the specific technology they
are leveraging.
2. What are the technical vulnerabilities associated with the protocols involved?
3. Have those been mitigated? And to what extent (i.e., has the risk been reduced to zero, reduced
somewhat, shifted to a third party, etc.)?
4. What residual risk to the target company’s assets and IP remain?
5. Would those risks extend to the current (takeover) company after the merger?
a. Would that be bad enough to cancel the M&A?
6. If the response to #5 is yes, then, what should the target company do to further mitigate the
risk? How should the takeover company mitigate the risk?
7. What are the costs associated to the target company (implementing the appropriate
mitigation)? If the takeover firm has to take additional measures, identify those costs as well.
After assessing and reviewing the streaming protocols, move to the next step, where you will assess the
infrastructure of the merged network.
Step 3: Assess the Merged Network Infrastructure
Youâ??ve just reviewed the streaming services of the companies, and now you will assess the
infrastructure of the new network. The networks of the two companies could be configured differently,
or they could use the same hardware and software, or completely different hardware and software.
The purpose of this section is to understand what tools the company is using, the benefits and
shortcomings of those tools, and the gaps within the network. Explain what tactics, techniques, and
procedures you would use to understand the network. You should identify firewalls, DMZ(s), other
network systems, and the status of those devices.
When your assessment of the infrastructure is complete, move to the next step, where you will assess
any existing policies for wireless and bring your own device (BYOD) within the companies.
Step 4: Review the Wireless and BYOD Policies
Within Project 2, you learned about and discussed wireless networks. An M&A provides an opportunity
for both companies to review their wireless networks. Within your report, explain the media company’s
current stance on wireless devices and BYOD. However, the company that is being acquired does not
have a BYOD policy. Explain to the managers of the acquisition what needs to be done for the new
company to meet the goals of the BYOD policy.
When the review of the wireless and BYOD policies is complete, move to the next step: developing a
data protection plan.
Step 5: Develop a Data Protection Plan
Youâ??ve completed the review of the wireless and BYOD policies. In this step, you will develop the
recommendations portion of your report in which you will suggest additional mechanisms for data
protection at different levels of the acquired companyâ??s architecture.
Include the benefits, implementation activities required for protection and defense measures such as
full disk encryption, BitLocker, and platform identity keys. You also want to convey to your leadership
the importance of system integrity and an overall trusted computing base, environment, and support.
Describe what this would entail and include Trusted Platform Module (TPM) components and drivers.
How are these mechanisms employed in an authentication and authorization system? Include this in the
report and whether the merging company has this.
In the next step, you will assess any risks with the supply chain of the acquired company.
Step 6: Review Supply Chain Risk
The data protection plan is ready. In this step, you will take a look at risks to the supply chain. Acquiring
a new company also means inheriting the risks associated with its supply chain and those firm’s systems
and technologies. Include supply chain risks and list the security measures in place to mitigate those
risks. Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal
Information Systems and Organizations to explain the areas that need to be addressed.
After your supply chain review is complete, move to the next step, where you will create a vulnerability
management program.
Step 7: Build a Vulnerability Management Program
After your supply chain review, you conduct an interview with the company’s current cybersecurity
team about vulnerability management. The team members explain to you that they never scanned or
had the time to build a vulnerability management program. So, you need to build one. Use NIST Special
Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to meet
the missing need.
Explain to the managers how to implement this change, why it is needed, and any costs involved.
The next step is a key one that should not be overlooked — the need to educate users from both
companies of the changes being made.
Step 8: Educate Users
Youâ??ve completed your vulnerability management program, but itâ??s important to educate all the users of
the network about the changes. During the process of acquiring a company, policies, processes, and
other aspects are often updated. The last step in the process is to inform the users for the new and old
company of the changes. Within your report, explain to the acquisition managers the requirements for
training the workforce.
When youâ??ve completed this step, move to the final section of this project, in which you will prepare and
submit your final report.
Step 9: Prepare and Submit Your Report, Executive Briefing, and Executive Summary
Youâ??re ready now for the final step, in which you will compile and deliver the Cybersecurity for a
Successful Acquisition report for the company leaders to enable them to understand the required
cybersecurity strategy.
Again, keep in mind that companies undergoing an acquisition or merger are more prone to
cyberattacks. The purpose of this paper is to analyze the security posture of both companies and to
develop a plan to reduce the possibility of an attack.
The assignments for this project are as follows:
4. Executive briefing: This is a three- to five-slide visual presentation for business executives and
board members.
5. Executive summary: This is a one-page summary at the beginning of your report.
6. Cybersecurity System Security Report for Successful Acquisition: Your report should be a
minimum 12-page double-spaced Word document with citations in APA format. The page
count does not include figures, diagrams, tables or citations.
Submit all three components to the assignment folder.
Deliverables: Cybersecurity for a Successful Acquisition, Slides to Support Executive Briefing
Before you submit your assignment, review the competencies below, which your instructor will use to
evaluate your work. A good practice would be to use each competency as a self-check to confirm you
have incorporated all of them in your work.
1.1: Organize document or presentation in a manner that promotes understanding and meets
the requirements of the assignment.
1.2: Develop coherent paragraphs or points to be internally unified and function as part of the
whole document or presentation.
1.3: Provide sufficient, correctly cited support that substantiates the writerâ??s ideas.
1.4: Tailor communications to the audience.
1.5: Use sentence structure appropriate to the task, message and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional looking documents appropriate for the project.
1.8: Create clear oral messages.
2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
2.2: Locate and access sufficient information to investigate the issue or problem.
2.3: Evaluate the information in a logical and organized manner to determine its value and
relevance to the problem.
2.4: Consider and analyze information in context to the issue or problem.
2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant
criteria and benchmarks.
5.9: Manages and administers integrated methods, enabling the organization to identify,
capture, catalog, classify, retrieve, and share intellectual capital and information content.
7.3: Knowledge of methods and tools used for risk management and mitigation of risk.
8.7: Provide theoretical basis and practical assistance for all aspects of digital investigation and
the use of computer evidence in forensics and law enforcement.

Purchase answer to see full

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

Order your essay today and save 15% with the discount code DISCOUNT15