Homework: assessing security culture | Cybersecurity | Bootcamp

Homework: Assessing Security Culture

A-K1

This week we learned about security culture and how to promote it within organizations. It’s important that all employees are aware of common security risks and treat security seriously. The majority of cyberattacks aim to exploit human weaknesses with methods like phishing. For this reason, people are most often the weakest link in an organization’s security defenses.

Scenario

  • Employees at SilverCorp are increasingly using their own personal devices for company work.
  • Specifically, over half of all employees check their work email and communications via Slack on their personal mobile phones.
  • Another 25% of employees are doing other work-related activities using work accounts and work-related applications on their personal phone.
  • Allowing sensitive work information to be shared on employees’ personal devices has a number of security implications.
  • You must research these security risks and use the security culture framework to develop a plan to mitigate the concerns.

Instructions

Compose the answers to the following four steps on Word Document. Step 1: Measure and Set Goals

Answer the following questions:

  • Using outside research, indicate the potential security risks of allowing employees to access work information on their personal devices. Identify at least three potential attacks that can be carried out.
  • Based on the above scenario, what is the preferred employee behavior?
  • For example, if employees were downloading suspicious email attachments, the preferred behavior would be that employees only download attachments from trusted sources.
  • What methods would you use to measure how often employees are currently not behaving according to the preferred behavior?
  • For example, conduct a survey to see how often people download email attachments from unknown senders.
  • What is the goal that you would like the organization to reach regarding this behavior?
  • For example, to have less than 5% of employees downloading suspicious email attachments.

Step 2: Involve the Right People Now that you have a goal in mind, who needs to be involved?

  • Indicate at least five employees or departments that need to be involved. For each person or department, indicate in 2-3 sentences what their role and responsibilities will be.

Step 3: Training Plan Training is part of any security culture framework plan. How will you train your employees on this security concern? In one page, indicate the following:

  • How frequently will you run training? What format will it take? (i.e. in-person, online, a combination of both)
  • What topics will you cover in your training and why? (This should be the bulk of the deliverable.)
  • After you’ve run your training, how will you measure its effectiveness?

This portion will require additional outside research on the topic so that you can lay out a clear and thorough training agenda.

  • 5 years ago
  • 10
  • wk11/2
  • discussion
  • 2
  • What does Robert Kennedy claim the United States did in 1962
  • I NEED THREE DIFFERENT PLEASE
  • Essay
  • DQ5.2
  • Again project
  • **KIM WOODS** wk 4 q1
  • Assessment 1: Individual Essay Due date: Week 6 (subject to confirmation at class in first week) Maximum length: 2,000 words Weighting: 50% Essay question: Compare...
5,636views
4.7
(173 ratings)

Related Study Guides

APP110 Week 1 | General Computer Science in Computer Science - CEHE

APP 110 Business Computer Fundamentals Week 1 Discussion DQ1 Computer Skills Learning Objectives Covered LO 01.01 - Discuss the importance of computer skills for career needs and personal use Career R...

art-designcommunication

Short discussions | Political Science homework help

short discussions idontexist- a year ago - 0.01 VICTIMOLOGY.docx VICTIMOLOGY.docx Book: Victimology , Leah e. Daigle SAGE Publications, 2nd Edition, 2017 Part 1 · In Chapter 7, we explore sexual victi...

art-designwriting

APP110 Week 2 | General Computer Science in Computer Science - CEHE

APP 110 Business Computer Fundamentals Week 2 Discussion DQ 1 Academic Referencing Learning Objectives Covered LO 04.02 – Demonstrate the use of Microsoft Word for creating citations and references Ca...

human-resourcesart-design

Assignment 1 Cyber Security in Telecommunications Company | CSIS 343 - Cybersecurity

4. Propose measures to secure customer accounts and authentication processes for telecommunications services. Discuss the importance of secure customer portals, strong authentication methods, and user...

communicationhuman-resources

Assignment 1 Cyber Security in Telecommunications Company | CSIS 343 - Cybersecurity

2. Evaluate the security of the company's voice over IP (VoIP) and unified communications systems. Recommend measures to secure voice communications, prevent eavesdropping, and protect against VoIP-sp...

communicationhuman-resources

Assignment 4 cybersecurity strategy for the critical infrastructure | CSIS 343 - Cybersecurity

5. Develop a comprehensive employee training program focusing on cybersecurity awareness and response for the critical infrastructure company. Address the role of employees in maintaining a secure env...

writingcommunication

Assignment 8 Mobile App Security Assessment for a Financial Institution | CSIS 343 - Cybersecurity

3. Evaluate the effectiveness of current authentication mechanisms in the mobile app. Recommend strategies for implementing secure authentication, including the use of biometrics, to enhance user acco...

educationcommunication

Culture and perception rough draft | Article writing homework help

4. Project must have a minimum of five scholarly sources. Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center. This assignment uses...

writinghuman-resources

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student