Project 4: Enterprise Cybersecurity Program Step 12: Evaluate Current Cybersecurity Technologies You

Project 4: Enterprise Cybersecurity ProgramStep 12: Evaluate Current Cybersecurity Technologies
You have incorporated both simulation and policy into the design of the enhanced enterprise cybersecurity program. The final element is to consider the NIST Cybersecurity Framework. Using the Defense Framework Enhancement Proposal and the Defense Framework Report, compile a list of cybersecurity technologies suggested for various cyber attack vectors. Look at whether these technologies are appropriate and current. The next step will build upon this work.
https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp640/learning-topic-list/nist-cybersecurity-framework.html?ou=642034
https://leocontent.umgc.edu/content/scor/uncurated/cmp/2218-cmp640/learning-topic-list/attack-vectors.html?ou=642034
Project 4: Enterprise Cybersecurity ProgramStep 13: Compose the Cybersecurity Technology Report
Using the evaluation of current technologies in the previous step, as well as the Defense Framework Enhancement Proposal and the Cybersecurity Framework Report, create a brief, one- to two-page description of how these technologies should be incorporated into the given defense framework.
Submit the Cybersecurity Technology Report for feedback before moving to the next step. Integrate feedback into this report to be used in the development of the final Enterprise Cybersecurity Program Report.
Submission for Project 4: Cybersecurity Technology Report