Security awareness

Assignment Help Basic Computer Science
Reference no: EM132381791

Security Awareness Report: An individual assessment in the form of a business report.

Using the organisation, context and risk profile documented in Continuous Assessment 1, write a report detailing the approach you would take to designing, developing and implementing an effective security awareness program for this organisation, based on the following scenario:

Your organisation has identified that its people are their best line of defence against the rising threat of cyber-attacks.

As the Cyber Security Manager, you have been tasked with developing an ongoing program of security awareness. The key objective is to change the behaviour of all employees to be aware of the various cyber threats and know how to take appropriate action to protect, detect and respond to security incidents.

Recent security incidents within the organisation have been traced back to human error and have given rise to the following security events:

1. Phishing email which resulted in the loss of credentials of a sensitive system.

2. Ransomware infection which resulted in business disruption to a key business unit.

3. Data breach of personally identifiable information which resulted in a data breach notification to impacted individuals (per the Australian Privacy Act).

In addition to documenting a broad-based program of security awareness, you will need to research and analyse one of these threats and discuss cost-effective awareness measures to mitigate against them, given the context of your organisation.

Finally, as future investment in cyber security is dependent on demonstrating the effectiveness of the security awareness program, you have also been asked to research and document an effective approach to measuring the effectiveness of the overall program.

Note: Any assumptions made about the nature of the existing IT controls at the organisation should be documented in the report.

The report should be written in a professional business language, aimed at the senior leadership/Executive team of your organisation and cover the following areas:

· Executive Summary (including business context)

· Security Awareness Needs Assessment

· Security Awareness Strategy and Plan

· Methods for Delivery of Security Awareness

· Threat Discussion (as chosen above)

· Security Awareness Measures and Metrics

Your report should be 3,000 words (+/-10%) in length. You will need to concentrate on delivering a concise report while ensuring that all relevant topics are covered with consideration of the intended audience.

All references and readings must be cited in the report's bibliography.

Note: The Executive Summary should briefly summarise the key actions / recommendations arising from the report. It is not a summary the different sections or approach contained within the report.

The intent of an Exec Summary is so that corporate Executives (with v. little time on their hands) can quickly become acquainted with a large body of material without having to read the whole report.

Attachment:- Information Technology Security Awareness and Training Program.rar

Attachment:- Security Awareness Program Report.rar

Attachment:- Continuous assessment.rar

Reference no: EM132381791

Questions Cloud

Information governance program using the igrm model : "Implementing an Information Governance Program using the IGRM Model."
Consider a zero-coupon bond with 28 years : What is the duration of the bond? It has a face value of $1000. [Answer in xx.xx format].
Calculate the taxable equivalent rate of return : Calculate the taxable equivalent rate of return if BB's marginal tax rate is 33%.
What is the value of stock today : Southern Foods just paid an annual dividend of $3.10 a share. Management estimates the dividend will increase by 4 percent for one year then 8 percent
Security awareness : Security Awareness Report: An individual assessment in the form of a business report. In addition to documenting a broad-based program of security awareness,
What will be billy bob monthly payment : Billy Bob and family are planning on purchasing a vehicle for $44600 using a 4 year (48 months) fixed-rate loan from their local credit union.
How much should you be willing to pay today for gopher : a. How much should you be willing to pay today for Gopher Gardens? b. If you can buy the property for $43 million, what is the NPV of this opportunity?
What will be billy bob monthly payment : What will be Billy Bob's monthly payment (i.e. how much will his payment be each month for the next 48 months)?
What are the familys individual and collective strengths : What are the effects of maltreatment that affect safety, permanency, and well-being - What are the family's individual and collective strengths

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd