Type: Discussion Board
Unit: Importance of Training
Due Date: Tue,1/28/20
Grading Type: Numeric
Points Possible: 75
Points Earned:
Deliverable Length: 400–600 words
View objectives for this assignment
Go To:
·
Assignment Details
·
Scenario
·
Learning Materials
·
Reading Assignment
My Work:
Online Deliverables:
·
Discussion Board
Looking for tutoring?
Go to Smarthinking
Collapse All | Expand All Collapse All | Expand All
Assignment Details
Assignment Description
Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. This week, you will research the importance of cybersecurity policies for various user groups. You and your classmates will identify key user groups and identify requirements applicable to them.
The insider threat is still considered by the FBI and Department of Homeland Security to be the number one threat to an organization. This is most often attributed to employees exhibiting poor behavior or disregarding information and cybersecurity policies and procedures. Eighty percent of all breaches are caused by individuals clicking on links that lead to the installation of malware on computer systems or opening attachments that allow attackers to gain access to the organization’s computer systems and networks (Yasin, 2016). If undetected, these breaches can cause significant harm to an organization’s reputation and cost millions of dollars in damages. Some of these risky behaviors include the following:
· Writing down passwords and placing them under keyboards or posting them in the work area
· Browsing to nonwork-related Web sites, which can contain malware
· Tailgating into areas where accountability is required to be maintained
· Sharing username and other log-in credentials between employees
· Walking away from computers without locking the workstation
Include the following in your primary Discussion Board post:
· Explain why it is necessary for an organization to consider developing policies related to acceptable use of computer systems.
· Briefly describe at least 3 policies that would be considered best practices for any organization to adopt to reduce the risk of the accidental insider threat. You should include at least 2 from the following list and 1 of your own:
· Acceptable Use Policy
· Privileged Use Policy
· E-Mail Policy
· Finally, explain how you would communicate the importance of each policy to the user group that the policy is applicable to. When describing the communication, include the channel you will use to communicate.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
· What did you learn from your classmate’s posting?
· What additional questions do you have after reading the posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your posting and other classmates’ postings?
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reference
Yasin, R. (2016, May 24). Employee negligence the cause of many data breaches. DARK Reading. Retrieved from https://www.darkreading.com/vulnerabilities—threats/employee-negligence-the-cause-of-many-data-breaches-/d/d-id/1325656?
Reading Assignment
Unit 3: CYBR609 CTU Library Guide
Appendix: The Channels of Communicating the Message in
Communicating Strategy
Assignment Objectives
· Interpret the impact of the Digital Age on professional communications
Other Information
There is no additional information to display at this time.
Legend
· Extra Credit
· View Assignment Rubric
Collapse All | Expand All Collapse All | Expand All
Assignment Details
Assignment Description
Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. This week, you will research the importance of cybersecurity policies for various user groups. You and your classmates will identify key user groups and identify requirements applicable to them.
The insider threat is still considered by the FBI and Department of Homeland Security to be the number one threat to an organization. This is most often attributed to employees exhibiting poor behavior or disregarding information and cybersecurity policies and procedures. Eighty percent of all breaches are caused by individuals clicking on links that lead to the installation of malware on computer systems or opening attachments that allow attackers to gain access to the organization’s computer systems and networks (Yasin, 2016). If undetected, these breaches can cause significant harm to an organization’s reputation and cost millions of dollars in damages. Some of these risky behaviors include the following:
· Writing down passwords and placing them under keyboards or posting them in the work area
· Browsing to nonwork-related Web sites, which can contain malware
· Tailgating into areas where accountability is required to be maintained
· Sharing username and other log-in credentials between employees
· Walking away from computers without locking the workstation
Include the following in your primary Discussion Board post:
· Explain why it is necessary for an organization to consider developing policies related to acceptable use of computer systems.
· Briefly describe at least 3 policies that would be considered best practices for any organization to adopt to reduce the risk of the accidental insider threat. You should include at least 2 from the following list and 1 of your own:
· Acceptable Use Policy
· Privileged Use Policy
· E-Mail Policy
· Finally, explain how you would communicate the importance of each policy to the user group that the policy is applicable to. When describing the communication, include the channel you will use to communicate.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
· What did you learn from your classmate’s posting?
· What additional questions do you have after reading the posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your posting and other classmates’ postings?
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reference
Yasin, R. (2016, May 24). Employee negligence the cause of many data breaches. DARK Reading. Retrieved from https://www.darkreading.com/vulnerabilities—threats/employee-negligence-the-cause-of-many-data-breaches-/d/d-id/1325656?
Reading Assignment
Unit 3: CYBR609 CTU Library Guide
Appendix: The Channels of Communicating the Message in
Communicating Strategy
Assignment Objectives
· Interpret the impact of the Digital Age on professional communications
Other Information
There is no additional information to display at this time.
Legend
· Extra Credit
· View Assignment Rubric
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.