In the first milestone, you identified a recent security incident that took place. There were multiple incidents that were chosen such as Capital One,Target, OPM, Equifax, Home Depot, and so many more. In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident. This week you will work on Milestone 3.  In milestone 3 you are building upon your first two milestones and describe the mitigation strategy, results, etc. on the organization.  For example, if you chose Equifax in milestone 1 you introduced your topic, in milestone 2 you described the controls that surrounded the organization, and now in Milestone, you will evaluate the results of the security incident. All of these milestones tie into each other as you evaluate the circumstances of the incident and the results. The minimum is 2 written pages and this does not include the title or reference page.  You must properly APA format your response.

Milestone 3 of this assignment focuses on building upon the first two milestones and describing the mitigation strategy and results of the chosen organization’s security incident. This milestone requires evaluating the circumstances of the incident and analyzing the outcomes.

To start, let’s recap the previous milestones. In milestone 1, a recent security incident was identified, and examples of incidents like Capital One, Target, OPM, Equifax, and Home Depot were chosen. In milestone 2, the administrative, physical, and technical controls of the selected organization were assessed to determine which controls were not secure and led to the security incident.

Now, in milestone 3, the focus is on the mitigation strategy, results, and evaluation of the security incident. It is crucial to analyze the steps taken by the organization to mitigate the impact of the incident and prevent similar incidents in the future. The mitigation strategy refers to the actions and measures implemented to lessen the adverse effects of the incident and recover from it. This could include steps such as enhancing security controls, conducting investigations, implementing patches or updates, training employees on security practices, or even hiring external consultants to assess vulnerabilities.

Additionally, the evaluation of the results is an essential aspect of milestone 3. This involves an examination of the effectiveness of the mitigation strategy and its impact on the organization. Were the actions taken successful in resolving the incident and preventing future occurrences? Did the organization suffer any significant reputational or financial consequences? It is crucial to objectively analyze and draw conclusions about the results of the incident to provide insights into the incident response process and potential areas for improvement.

When discussing the mitigation strategy and results, it is important to provide a comprehensive analysis supported by relevant data, research, and scholarly sources. Additionally, proper APA formatting should be followed for in-text citations and the reference page.

In terms of the length requirement, the minimum expectation is to provide a response of at least 2 written pages, excluding the title and reference page. This ensures a sufficient level of depth and analysis in describing the mitigation strategy and evaluating the results of the security incident.

Overall, milestone 3 of this assignment aims to tie together the information gathered in the previous milestones and provide a comprehensive evaluation of the chosen organization’s security incident. Through discussing the mitigation strategy and evaluating the results, a deeper understanding of the incident response process and its impact on the organization can be achieved.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer