CIS8710 Human Factors in Cyber Security Assignment

Assignment Help Computer Engineering
Reference no: EM132980229 , Length: word count:1600

CIS8710 Human Factors in Cyber Security - University of Southern Queensland

The task is three inter-related sections. To complete these sections, you are expected to participate in weekly zoom sessions (for building section 3) as these tasks are expected to be progressively constructed.

You are to play in the role of a senior cyber security engineer at a company. You may choose the company (either fictional, your employer, or an example from industry). You are strongly encouraged to contextualise your response to the company and industry.

Section 1:

You must write a business memo to the CEO, requesting approval for the roll out of a "phishing simulation and education program" system across your organisation. This should have a strong argument backed with recent statistics from three key phishing incidents from the published materials (2020 - 2021) and academic references from 2020 - 2021. The memo should be clear, concise and of a type that is appropriate to present to a company executive. You have a high degree of flexibility in the presentation, but it should support a desired outcome of being approved and reinforcing executive confidence in you as a cyber-security professional. It should be persuasive and of a quality expected by a CEO.

The maximum length is 3 pages, so clarity of message and being concise is important. The memo will be of one page in length, with the other two pages providing argument to justify the rollout.

Section 2:

As a one-page appendix to section 1, you must present an example of a targeted phishing email that presents and demonstrates the risk to your company, which supports your argument.

Section 3:

You are required to provide a one-page self-critique of your memo and appendix, highlighting the behavioural elements you have used, demonstrating the linkages to the course content, and any further self-study undertaken. This is a reflective exercise to develop your self-awareness and improve your submission. This reflection will occur in the weekly zoom sessions, you will attach a journal of activities to the assignment.

Learning objective:
1. Apply specialised knowledge relating to the roles that humans play in causing, enabling and mitigating cyber security risks.
2. Analyse critically, reflect on and synthesise complex issues, information, problems, concepts and theories relating to the role that people play in cyber security, and how this relates to process, technology and policy.
3. Examine and then apply specialist knowledge and skills in managing human factors and behaviour to counter cyber threats.
4. Research and review sources of specialist human behavioural knowledge relating to cyber security knowledge, and how these can be applied towards improved cyber security controls.
5. Interpret, articulate and communicate complex issues relating to human factors in cyber security to achieve targeted outcomes.

Attachment:- Human Factors in Cyber Security.rar

Reference no: EM132980229

Questions Cloud

Explain loyalty to self and loyalty to a community : What in your view is the most moral thing for that person to do in that dilemma? Why is that the most moral thing? Use moral values and logical reasoning
What crimes has ralph committed : Ralph has become very disenchanted with the United States. He thinks his taxes are too high, he thinks the government has bugged his phones, and he is sure he s
What is the current share price : If the appropriate rate of return on the stock is 10%, compounded semi-annually, what is the current share price
Building a business case for safety : You are a seasoned health and safety manager who has been working at ACME Widgets for over 10 years. You have an excellent track record of successful implementa
CIS8710 Human Factors in Cyber Security Assignment : CIS8710 Human Factors in Cyber Security Assignment Help and Solution, University of Southern Queensland - Assessment Writing Service
Describe management practices and organizational behavior : Describe how management practices and organizational behavior can help organizations deal with contemporary management concerns.
How much is the net prepaid-accrued defined benefit cost : How much is the net prepaid/accrued defined benefit cost that was shown on December 31, 2020 balance sheet? use negative sign (-) if accrued
Find a business presentation : Find a business presentation that interests you. Describe the presentation and why it was effective or ineffective.
Identify six attitudes and attributes the service industry : Identify six attitudes and attributes the service industry expects of you, when workingwith customers.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Modify the stack directly or use the existing pop operation

To implement this operation, you could either modify the stack directly or use the existing Pop operation. What would be the advantages and disadvantages of each method?

  What do you think the impact will be on other countries

What do you think the impact will be on other countries around the world as these two countries become even more significant in the global economy?

  Encipher a message using a keyword

The first program will encipher a message using a keyword and second program will decipher a message using a keyword.

  What is the use of the variable classpath

Write a method code defined by yourself for the sum of 3 numbers and that outputs the value. Write only the code of the Method.

  Develop algorithm for program that takes input single letter

Develop an algorithm for a Java program that takes as input a single letter and displays the corresponding digit on the telephone.

  How can you make your database more hacker-proof

How can you make your database more hacker-proof? How do you ensure the security of an organizations' distributed databases? What specific vulnerabilities affect Web enabled databases?

  Prove root two is not a rational number

Prove root 2 is not a rational number

  Computing the total score of each computer

Computing the total score of each computer to find the best computer; i.e., the computer with the highest total score.

  Market adoption technical architecture technical support

virtualization is generally defined as the creation of a virtual version of a computer object. the computer objects may

  Create an ipo chart for the problem

Create an IPO chart for the problem, and then desk-check the algorithm seven times, using sales of 20000, 20001, 30000, 50000, 50001, 75000, and -3.

  Write a threaded echo client and add a nice feature

Your problem is to add a "nice" feature to this program to allow a user to start a command-line shell on the host machine.

  Explain the theories of operations security

ISOL631– Operations Security University of the Cumberlands Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd