CIS8710 Human Factors in Cyber Security Assignment

Assignment Help Computer Engineering
Reference no: EM132980229 , Length: word count:1600

CIS8710 Human Factors in Cyber Security - University of Southern Queensland

The task is three inter-related sections. To complete these sections, you are expected to participate in weekly zoom sessions (for building section 3) as these tasks are expected to be progressively constructed.

You are to play in the role of a senior cyber security engineer at a company. You may choose the company (either fictional, your employer, or an example from industry). You are strongly encouraged to contextualise your response to the company and industry.

Section 1:

You must write a business memo to the CEO, requesting approval for the roll out of a "phishing simulation and education program" system across your organisation. This should have a strong argument backed with recent statistics from three key phishing incidents from the published materials (2020 - 2021) and academic references from 2020 - 2021. The memo should be clear, concise and of a type that is appropriate to present to a company executive. You have a high degree of flexibility in the presentation, but it should support a desired outcome of being approved and reinforcing executive confidence in you as a cyber-security professional. It should be persuasive and of a quality expected by a CEO.

The maximum length is 3 pages, so clarity of message and being concise is important. The memo will be of one page in length, with the other two pages providing argument to justify the rollout.

Section 2:

As a one-page appendix to section 1, you must present an example of a targeted phishing email that presents and demonstrates the risk to your company, which supports your argument.

Section 3:

You are required to provide a one-page self-critique of your memo and appendix, highlighting the behavioural elements you have used, demonstrating the linkages to the course content, and any further self-study undertaken. This is a reflective exercise to develop your self-awareness and improve your submission. This reflection will occur in the weekly zoom sessions, you will attach a journal of activities to the assignment.

Learning objective:
1. Apply specialised knowledge relating to the roles that humans play in causing, enabling and mitigating cyber security risks.
2. Analyse critically, reflect on and synthesise complex issues, information, problems, concepts and theories relating to the role that people play in cyber security, and how this relates to process, technology and policy.
3. Examine and then apply specialist knowledge and skills in managing human factors and behaviour to counter cyber threats.
4. Research and review sources of specialist human behavioural knowledge relating to cyber security knowledge, and how these can be applied towards improved cyber security controls.
5. Interpret, articulate and communicate complex issues relating to human factors in cyber security to achieve targeted outcomes.

Attachment:- Human Factors in Cyber Security.rar

Reference no: EM132980229

Questions Cloud

Explain loyalty to self and loyalty to a community : What in your view is the most moral thing for that person to do in that dilemma? Why is that the most moral thing? Use moral values and logical reasoning
What crimes has ralph committed : Ralph has become very disenchanted with the United States. He thinks his taxes are too high, he thinks the government has bugged his phones, and he is sure he s
What is the current share price : If the appropriate rate of return on the stock is 10%, compounded semi-annually, what is the current share price
Building a business case for safety : You are a seasoned health and safety manager who has been working at ACME Widgets for over 10 years. You have an excellent track record of successful implementa
CIS8710 Human Factors in Cyber Security Assignment : CIS8710 Human Factors in Cyber Security Assignment Help and Solution, University of Southern Queensland - Assessment Writing Service
Describe management practices and organizational behavior : Describe how management practices and organizational behavior can help organizations deal with contemporary management concerns.
How much is the net prepaid-accrued defined benefit cost : How much is the net prepaid/accrued defined benefit cost that was shown on December 31, 2020 balance sheet? use negative sign (-) if accrued
Find a business presentation : Find a business presentation that interests you. Describe the presentation and why it was effective or ineffective.
Identify six attitudes and attributes the service industry : Identify six attitudes and attributes the service industry expects of you, when workingwith customers.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd