Case study-designing a seta program

Assignment Help Basic Computer Science
Reference no: EM131446355

Case Study: Designing a SETA Program

Anytown USA Bank prides itself on being very responsive to its customers. It offers 24-hours staffed customer care center with a toll- free number, over the past year, there has been a significant decline in calls and a corresponding increase in email services request. As information Security Officer (ISO), you are very concerned that customer information classified as protected is being sent via email or email attachment. You have requested a meeting with the director of IT to explore secure email options since regular email is sent across the internet in plain text. In the meantime, you want to make sure that employees understand the danger of using regular email.

Working with the training department, you are going to launch a security awareness campaign. The theme is "". The message is that users should never write anything in an external email that they wouldn't write on a postcard.Create a security awareness campaign focused on the topic. Include in this plan specific on how you intend to deliver the message.Create at least one piece of supporting collateral.Design a way to test the effectiveness of your message.Before launching the campaign, you want to make sure you have the full support of the executive management.What type of "educational" program would you develop for the management?What would the message be?Outline the SETA program that will be needed to ensure the success of the "secure email" application.

Note: Please this should be answered as listed and any references can be added on a separate page.

Reference no: EM131446355

Questions Cloud

Write an film critique essay : The thesis statement is criticizing the flim "Pocahontas" is a story which beauify the European Colonist in American - Write an film Critique essay
Number of vertices with an odd degree : Since in an undirected graph, the number of vertices with an odd degree must be even, theremust be 2n vertices that can be paired up into n pairs. Why?
Explain the differences between accessing the internet : Explain the differences between accessing the Internet via a modem, DSL, a cable modem, and satellite. Which of these access mechanisms are likely to become more important in the future?
What are the differences between scripting and programming : Believe it or not, many professionals believe that if you know only scripting languages, you are not a programmer. What are the differences between scripting and programming? Is one harder to learn/apply than the other is? Research what code portabil..
Case study-designing a seta program : Anytown USA Bank prides itself on being very responsive to its customers. It offers 24-hours staffed customer care center with a toll- free number, over the past year, there has been a significant decline in calls and a corresponding increase in e..
Identify the purpose of the article : identify the author, the name of the article, and the date and place of publication and identify the main idea/argument/position/assumption of the author,
Why is python a great starter language : Why was BASIC good in the past? Why have we moved to Python? Feature-by-feature, how powerful is BASIC vs. Python? Which language of the two do you feel would be more valuable in your career?
Evaluate subprime loans with notion of social responsibility : Critique the role of leadership decision-making in the subprime loan financial crisis. Evaluate subprime loans with the notion of social responsibility. Compare and contrast the resulting consequences for these actions.
Discuss about the workstation software and server software : One factor that IT professionals must consider when building a server is whether that server should be simply server software installed on regular hardware; server software installed on server hardware; or regular software installed on server har..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Derive boolean equations for the magnitude comparator

Derive boolean equations for the carry lockhead generator for the binary adders of 6-bit numbers.

  Algorithm that adds up a sequence of twenty numbers

Write an algorithm that adds up a sequence of twenty numbers and outputs the sum of the numbers as well as the average of the numbers.

  Would that be a live acquisition, or a postmortem one

Consider a local area network, attached to the Internet, with email capabilities provided to LAN users. What are some of the capabilities already built in to these systems that might aid the investigator? How might you put those to use? Would that be..

  What cost cutting measures are proposed

What cost cutting measures are proposed and How will the expanded coverage be paid for?

  How much farther is the flight than a direct route

The lengths of the sides of a triangle are 74 feet, 38 feet, and 88 feet. What is the length of the altitude drawn to the longest side?

  Compute the global boolean or of all input values on ring

Consider an anonymous ring of size n. Each node v stores an input boolean value i(v). When the algorithm terminates, then every node is to store the output in its private variable. Every node knows n, in that n can be a part of code.

  Implement normal environment reflection or shadow mapping

This chapter is just a jumping off point for numerous reading and coding projects. For example, you can implement normal, environment, reflection or shadow mapping.

  Html page with javascript using if statement

The game of "23" is a two-player (computer versus player) game that begins with a row of 23 toothpicks. Players take turns, withdrawing 1, 2 or 3 toothpicks at a time. The player to withdraw the last toothpick loses the game.

  Sort result table by the last name and then by first name

List the last name, first name, and hire date of all the people in the L_employees table. Divide the hire date column into two columns: one called "old timers" for people hired before the year 2000, and one called "newer hires" for people hired af..

  Improve on the regression model of ln mpg

See if you can improve on the regression model of ln MPG on ln HP and weight. Use a Box-Cox transformation to try to eliminate the skewness in the normal probability plot.

  What are the independent and dependent variables

Look at the results of engineering analyses in journals or textbooks. What are the independent and dependent variables? Can a dependent variable be the independent variable in another experiment, and vice versa?

  Write pseudo code for an iterator

Your pseudo code must define the standard iterator functions open(), next(), and close(). Show what state information the iterator must maintain between calls.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd