Successful execution of the plan

Assignment Help Basic Computer Science
Reference no: EM131293562

The Security Plan-What Employees Need to Know

After the SAP has been designed, it is time to develop all the supporting materials needed for a successful execution of the plan. During the development phase, it is not only essential to take a close look at the list of identified security topics but also to decide what level of training or awareness is needed on each issue.  For example, if employees only need to be aware of a certain policy or procedure, a simple e-mail advisory may be enough.  However, if employees need to develop a certain skillset, it may be necessary to develop a day-long seminar or a comprehensive course. In addition, it is important to think about whether multiple methods of communication are appropriate for certain security topics.

For this Discussion, you will consider what employees of an organization need to know about an organization's security.

Assume you are developing a security plan for a typical mid-size company of just under 500 employees. Analyze the security needs for a company of this size and determine what employees need to know about at least two security topics that need to be covered for this organization. Take into consideration items from the security topics contained in section 4.1.1 of NIST-SP800-50 from this unit's Learning Resources.

Post a 350- to 500-word evaluation of what employees need to know about at least two security topics.  In your evaluation, include the employee behavior(s) an organization should work to enforce and an explanation of materials that should be developed to successfully educate the employees.

Reference no: EM131293562

Questions Cloud

Discuss specific changes in supply and demand : Discuss specific changes in supply and demand. Examine prior government policies and legislation that exacerbated the impact of the shocks.
How does transportation add value in a supply chain : How does transportation add value in a supply chain?What are the potential disruptions in transportation?How do the disruptions impact the performance of a supply chain?
Describe influence that corporate social responsibility has : Identify how the organization applies corporate social responsibility to the business. Evaluate the influence that corporate social responsibility has on the organization.
Analyze sources to support the teams decision : Identify sources to support the team's decision and explain why the sources are credible. Include an explanation as to the difference between claims and sources and the effect this has on the decision.
Successful execution of the plan : After the SAP has been designed, it is time to develop all the supporting materials needed for a successful execution of the plan. During the development phase, it is not only essential to take a close look at the list of identified security topic..
Identify the end goal of your social influence : Identify the end goal of your social influence. Explain who you are trying to persuade and exactly what are you trying to persuade them about. Are your targeting an attitude, a belief, a value, a behavior, or a combination of these?
Discuss how to use the power of each design most effectively : Discuss the benefits of using both designs in the research study. Determine which design (qualitative or quantitative) will become the primary research design. Discuss how to use the power of each design most effectively.
Charge of training in a petroleum company : Consider this scenario. You are the human resources manager in charge of training in a petroleum company. You have been asked to design and develop a comprehensive new training system which will be used to ensure those employees who use templat..
What is the brand : MKTG-102-5 Principles of Marketing-What is the brand?How many sold the first weekend? What changes in each model ? Why is there different models Uses behind?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create the two methods that respectively square

Create the two methods that respectively square and cube a number that is passed to them, returning the calculated value

  Problem regarding the expectancy theory

According to expectancy theory, what can a manager do to increase an employee's motivation? Does his or her culture make a difference?

  Maintaining an organization large networks

When you are an IT specialist who is tasked with maintaining an organization's large networks, it is important have an understanding of potential risks. It has been said most network issues can fall a number of categories:

  Department names of the oracle departments

What are the department names of the Oracle departments that have the same location ID as Seattle?

  Develop the tourism industry at sterling bay

Assume that tourism has been selected as the preferred industry to be developed. What type of tourism should be adopted? Describe examples of F&B, accommodation, transportation, attractions and events that suit the approach that you have recommend..

  Pros and cons of improving information security

Please discuss the pros and cons of improving information security with federal regulations. How well received are the regulations in the affected industries? Have they helped?

  Which setting do you like best and why

Right-click on a spot of your desktop that is not covered by an icon, window, or menu. When the menu comes up, play with the options under the "Sort By" menu. Which setting do you like best and why.

  Redesign the table employee

Alter this design so that EMPLOYEE has a 1:1 relationship to PHONE_NUMBER. For employees having more than one phone number, keep only the first one

  Let alone windows

You're working with a typical user who doesn't know much of ANYTHING about computers, let alone Windows. They're notorious for losing track of documents they worked on, and they hate having to go into the Start menu to find programs. List three tw..

  Write for loops to produce the following output

Write for loops to produce the following output

  Process computer uses to convert data into information

Write down a 200 word paper which explains the distinctions of data and information and in short describe the process a computer uses to convert data into information.

  Plaigarism and the commands explanation

The assignment subject is about System security which should be done in the Linux environment and should be in details according to the criteria given, there should not be any plaigarism and the commands explanation should be in won words, so plz ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd