Security awareness training

Assignment Help Basic Computer Science
Reference no: EM133030012

Scenario

You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University's information security program. The CISO is working to address the university's GLBA data safeguarding requirements that you previously provided to the Premier University president.

The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.

You recently notified the university's president that information security awareness and training is a gap in the institution's written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.

Tasks

Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.

Reference no: EM133030012

Questions Cloud

Groupware can provide to decision makers : Describe the kinds of support that groupware can provide to decision makers. Explain why most groupware is deployed today over the Web.
Organization response to information security incident : An incident response policy is a plan outlying an organization's response to an information security incident.
Information technology with global business strategy : Misalignment of information technology with global business strategy can severely hamper a firm's efforts to seek global pre-eminence.
Radio frequency identification chips case study : Why did NFL equip its players with RDIF tags? What factors contributed to the success of the IoT initiative at the NFL?
Security awareness training : You recently notified university's president that information security awareness and training is a gap in institution's written information security program
Current work environment : Provide reflection of how knowledge, skills or theories of course have been applied, or could be applied, in practical manner to current work environment.
Traditional project management team and scrum team : What are the differences between the traditional project management team and the Scrum team?
Company network : When would you want to create an Azure VM for your company's network? Tell how you might access the VM if you have one created on your subscription.
Wave of technology innovation : Expand on the 5th wave of technology innovation by giving some clear examples of information technology that we could say is helping shape this definition

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define tam and the components

Define TAM and the components. Note how TAM is impacting educational settings.

  How did you get for your regression line

How did you get for your regression line? What was your r value? What did this tell you?

  Interpretation of components of cluster mean

What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean?

  Calculate the maturity risk premium on the 2-year treasury

Calculate the maturity risk premium on the 2-year Treasury security

  Disaster and comprehensive recovery test

A simulated disaster and comprehensive recovery test may involve many of an organization's key personnel for several days:

  Experiences of associated business risks

UNFO traditionally has been a brick-and-mortar retailer, and the management has experiences of associated business risks such as employee theft and shoplifting.

  University library or the university online course

Observe the online catalogue system at your university library OR the university online course registration system. Write a dialog that shows the interaction between the user and the system. Rewrite the dialog to improve it. Create a storyboard to sh..

  Mobile devices in society today has indeed become ubiquitous

We learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.

  Discuss the financial benefits of chatbots

Some people say that chatbots are inferior for chatting. Discuss the financial benefits of chatbots.

  Discuss the right of a corporate network administrator

Discuss the right of a corporate network administrator to use packet sniffers. Are employees' privacy rights being violated?

  Form of employee participation is important

Why or why not? If not, how would you go about trying to convince Mr. Rainer that some form of employee participation is important.

  Business drivers and business requirements

Analyze the efficacy of the SCM (supply chain management)enterprise systems in terms of providing support in business strategy, business drivers and business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd