Cybersecurity Awareness Campaign

Assignment Help Basic Computer Science
Reference no: EM133194566

Cybersecurity Awareness Campaign

Assignment Content

As a final project requirement, the executive staff requested recommendations to address the following:

Strategy for staff awareness

Strategy for ongoing security maintenance

The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member's request. Your campaign consists of the following three items:

Mission statement

Poster campaign

Message to organization via the intranet

Create an security policy mission statement for Dayton Soft Products. Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission statement. Highlight at least 5 legal and ethical issues across the 3 posters. You may use any program to create your posters.Write a message for the company's internal website to a diverse workforce announcing the cybersecurity awareness material. You will need to submit a draft of your announcement message to the executive staff in the form of a Microsoft® Word document. Provide the following elements in your announcement message:

The reason the corporate security policy was established

Mission statement

Employees' role to meet the mission

Announce launch of the poster campaign

Large images of the three posters

Strategies and tools for ongoing monitoring and enforcement of security policy.

Reference no: EM133194566

Questions Cloud

Components of the COSO framework : The objectives of the COSO framework are closely related to its five components. Discuss these five components of the COSO framework.
Factors Influencing IT Governance : What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?
Business and Finance Business Process Redesign : New England College of Business and Finance-If you have you been involved with a company doing a redesign of business processes,
Define Predictive analytics : ITS 532-New England College of Business and Finance-Define predictive analytics and discuss how an IT manager might use such analytics.
Cybersecurity Awareness Campaign : CMGT 433-University of Phoenix-Create an security policy mission statement for Dayton Soft Products.
Artificial Intelligence-Machine Learning in Big Data : Discuss the roles of Artificial Intelligence and Machine Learning in Big Data Analytics.
Existing cloud and address new cloud technology : Central Michigan University-Discuss the future of Microsoft Azure Cloud, AWS Cloud, or Google Cloud Services.
Security Architecture and Design : Discuss the benefits of business analytics and provide one example how it can be used to help an organization address cybersecurity.
Assess the general brand marketing : General Brand Marketing: Italian excellence the rest of the world can only dream of: We build cars unique in terms of their performance. Strayer University.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the maximum profit

If the company makes a profit of $320 on each case of drug A and $500 on each case of drug B, how many cases of each drug should be produced in order to maximize profit?

  Change an asset to a financial liability or vice versa

Explain your rationale to support your position. Provide 2 factors that can potentially change an asset to a financial liability or vice versa.

  Each cycle in an instruction cycle

Suppose each cycle in an instruction cycle takes an average of 5 clock cycles. Determine the number of clock cycles needed to process 10 instructions without and with a pipeline

  Current technologies in regards to business it

What is your personal research strategies for identifying and evaluating current technologies in regards to business IT infrastructure?

  Draw the entire array and the contents of each index

Draw the entire array and the contents of each index. Write "X" in any index in which an element is removed and not replaced by another element. Also write the size, capacity, and load factor of the final hash table.

  Quantitative v. qualitative security risk assessment

Discuss in 500 words on Quantitative v. Qualitative security risk assessment. These topics should be focused and interesting not generic.

  Do you think national polls impact peoples

Do you pay attention to polls? Do you think national polls impact peoples' views on a topic?

  Symmetric and asymmetric encryption

What is the user experience like? Please be sure to review Hashing, Symmetric and Asymmetric Encryption as well as Public Key Infrastructure.

  Employee security awareness training presentation

You are employees in an information security (IS) Department. Make sure to provide an overview of the ficticious company you are basing this presentation

  Determining the network standards and protocols

List and discuss at least three major ways your life has been impacted due to the ability to communicate over the Internet? What specific network standards and protocols do you use personally when communicating over the Internet?

  Multidimensional events generated by adaptive human agents

Multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same

  Information security audits

Network Security - Information Security Audits (word count 850) Which of the following would be part of an bi-annual corporate audit and what type of information would be gathered including which polices if any would apply?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd