So, this is the first part of my 4 part capstone project for my cybersecurity Management program. So, there are a couple of very important things to note here.
First of all, ignore the part where it says that you need a real company with a real business advisor (at least a department head). That is incorrect. However, HOWEVER, while the name of the company and advisor will be fictitious the fundamental underpinnings still have to very much be rooted in reality. My project title is “Establishing Information Security Policies for Data Management at an IoT-enabled mobile sensor startup”. I attached a screenshot for you to paraphrase the information there as to why this startup is so essential (shifting industry trends from reactive to proactive, as well as technical info like v2x capabilities, live data streaming, and connecting police/first responders/security officers to command centers). There are also at least ten different types of IoT-enabled mobile sensors so you can integrate some technical info for that as well. HOWEVER, other than this, the project should be entirely focused on the policy formulation aspect.
Second, this project MUST be done for the ISEC695 section (Information Security Policies). Instead of a title page and certificate of authorship (I will add myself after), make sure to do a thorough table of contents (link the actual pages to make them “clickable” please).
Third, IT IS OF THE UTMOST IMPORTANCE that you do not forget the TECHNICAL APPENDIX section. This is where you will actually propose multiple policies based on things like the NIST cybersecurity framework, COBIT, and Mccumber’s cube. This will be a very key portion of this paper so please pay extra attention to this part!
Finally, make sure to only use scholarly sources (I attached the screenshot just to give you an idea what to include in company descriiption.)
If you have any questions or issues, PLEASE reach out to me ASAP. I will respond ASAP!