A busy week after completing and submitting the Final Report, here I publish the report and supporting work for review on my blog.
I’m not completely sure all the criteria of the capstone project have been satisfied, but I’m very happy with the content of the report.
Please note that these are quite large files, so they will be provided in file form, rather than being expanded into the blog. The report is presented in IEEE Journal format, from the IEEE Transactions on Information Forensics and Security template, from https://template-selector.ieee.org. The report contains an embedded spreadsheet, in the Appendix, comparing ten cybersecurity standards and frameworks and three control families, used for the comparison of required standards. The Seminar Presentation Video was too large to embed in the blog and has been made available on OneDrive.
Cybersecurity Standards Required of US and Australian Defence Supply Chains: Disparity of Standards and SME Achievability |
Excel Attachment – Analysis of Requirements
Cyber_Requirements_Controls_Maturity_Compared_V1.4B
Seminar Presentation Video
https://1drv.ms/u/s!AhGttn3gwriShKszmQGz_JeWSJ2C5A?e=vvQbqo