Security awareness

Assignment Help Basic Computer Science
Reference no: EM132381791

Security Awareness Report: An individual assessment in the form of a business report.

Using the organisation, context and risk profile documented in Continuous Assessment 1, write a report detailing the approach you would take to designing, developing and implementing an effective security awareness program for this organisation, based on the following scenario:

Your organisation has identified that its people are their best line of defence against the rising threat of cyber-attacks.

As the Cyber Security Manager, you have been tasked with developing an ongoing program of security awareness. The key objective is to change the behaviour of all employees to be aware of the various cyber threats and know how to take appropriate action to protect, detect and respond to security incidents.

Recent security incidents within the organisation have been traced back to human error and have given rise to the following security events:

1. Phishing email which resulted in the loss of credentials of a sensitive system.

2. Ransomware infection which resulted in business disruption to a key business unit.

3. Data breach of personally identifiable information which resulted in a data breach notification to impacted individuals (per the Australian Privacy Act).

In addition to documenting a broad-based program of security awareness, you will need to research and analyse one of these threats and discuss cost-effective awareness measures to mitigate against them, given the context of your organisation.

Finally, as future investment in cyber security is dependent on demonstrating the effectiveness of the security awareness program, you have also been asked to research and document an effective approach to measuring the effectiveness of the overall program.

Note: Any assumptions made about the nature of the existing IT controls at the organisation should be documented in the report.

The report should be written in a professional business language, aimed at the senior leadership/Executive team of your organisation and cover the following areas:

· Executive Summary (including business context)

· Security Awareness Needs Assessment

· Security Awareness Strategy and Plan

· Methods for Delivery of Security Awareness

· Threat Discussion (as chosen above)

· Security Awareness Measures and Metrics

Your report should be 3,000 words (+/-10%) in length. You will need to concentrate on delivering a concise report while ensuring that all relevant topics are covered with consideration of the intended audience.

All references and readings must be cited in the report's bibliography.

Note: The Executive Summary should briefly summarise the key actions / recommendations arising from the report. It is not a summary the different sections or approach contained within the report.

The intent of an Exec Summary is so that corporate Executives (with v. little time on their hands) can quickly become acquainted with a large body of material without having to read the whole report.

Attachment:- Information Technology Security Awareness and Training Program.rar

Attachment:- Security Awareness Program Report.rar

Attachment:- Continuous assessment.rar

Reference no: EM132381791

Questions Cloud

Information governance program using the igrm model : "Implementing an Information Governance Program using the IGRM Model."
Consider a zero-coupon bond with 28 years : What is the duration of the bond? It has a face value of $1000. [Answer in xx.xx format].
Calculate the taxable equivalent rate of return : Calculate the taxable equivalent rate of return if BB's marginal tax rate is 33%.
What is the value of stock today : Southern Foods just paid an annual dividend of $3.10 a share. Management estimates the dividend will increase by 4 percent for one year then 8 percent
Security awareness : Security Awareness Report: An individual assessment in the form of a business report. In addition to documenting a broad-based program of security awareness,
What will be billy bob monthly payment : Billy Bob and family are planning on purchasing a vehicle for $44600 using a 4 year (48 months) fixed-rate loan from their local credit union.
How much should you be willing to pay today for gopher : a. How much should you be willing to pay today for Gopher Gardens? b. If you can buy the property for $43 million, what is the NPV of this opportunity?
What will be billy bob monthly payment : What will be Billy Bob's monthly payment (i.e. how much will his payment be each month for the next 48 months)?
What are the familys individual and collective strengths : What are the effects of maltreatment that affect safety, permanency, and well-being - What are the family's individual and collective strengths

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show outline of address distribution and forwarding table

An ISP is granted the block 16.12.64.0/20. The ISP needs to allocate addresses for 8 organizations, each with 256 addresses.

  Team is working on high visibility project

Your team is working on a high visibility project. Description of your product and project.

  How to add validation to a web application

How to add validation to a web application

  What is moral common ground

What is moral common ground and what effect does this have on an organization?

  Successful implementation efforts

List and define the factors that are important to successful implementation efforts.

  Discuss how you have used microsoft word

Discuss how you have used Microsoft Word, what feature do you find most valuable. Explain your answer.

  Compare the basic features of http status codes

Compare the basic features of HTTP status codes with those of the FTP reply codes given by RFC 640. What is one way in which these codes are similar and one way in which they are different?

  Determining the valid code

A valid flight code begins with 2 or 3 capital letters and is followed by 3 or 4 digits. This program should use the.matches( ) method with a regular expression. If the user does not enter a valid code, your program should continually request that..

  Multiplying monomials and polynomials

Do you always use the property of distribution when multiplying monomials and polynomials? Explain why or why not. Give examples that you have created. In what situations would distribution become important?

  How much related to other ways of dealing with defects

How much of your formal education and on-the-job training is related to defect prevention and how much related to other ways of dealing with defects? What changes would you suggest?

  Describe what sorts of academic evidence

For each of the following five scenarios, thoroughly describe what sorts of academic evidence you think will be most persuasive and why. If you need very little evidence, feel free to say so, but be sure to provide justification.

  Cybersecurity test and validation scheme

As an organization continues to evolve, making sure the security is continuously protected effectively against the latest threats is important.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd