What issues can arise in relation to with byod policies

Assignment Help Computer Network Security
Reference no: EM133104806

Task - Cyber Security Awareness

Scenario:
Read through the Task document on Canvas and create the following report. You will need to use the Information Technology Cyber Security Policy.

Your document must include:

1. Policies
a. Develop a set of policies and procedures for a work area that promote cyber security awareness and practices.
i. Is your login/screen locked down?
ii. Is your OS up to date?
iii. Do you have a strong password policy?
iv. Do you run antivirus updates, or utilize anti-virus, anti-malware and DNS filters?
v. Do you dispose of all data and equipment properly?
vi. Are mobile devices protected?
vii. Are employees educated?
viii. Do you have a security, backup and recovery plan in place?
ix. Do you know who to call for help?

2. Training
a. Create a PowerPoint to arrange training or updates to the employees to increase their awareness in cyber security matters (at least 2) from the following example:
i. Phishing attacks
ii. Removable media
iii. Passwords and authentication
iv. Physical security
v. Mobile device security
vi. Working remotely
vii. Public Wi-Fi
viii. Cloud security
ix. Social media use
x. Internet and email use
xi. Social engineering
xii. Security when working from home

3. Referencing
a. The Referencing style that we use is APA style.

Knowledge questions

Question 1. What is cyber security?

Question 2. Why Does Cyber Security Matter?

Question 3. Create a list of at least 5 sources of information you can access to determine new cyber security threats and trends.

Question 4. Which employees should complete cybersecurity awareness training courses?

Question 5. What topics should be covered in cyber defence training?

Question 6. Why would you need a cyber security policy in your workplace and what should be included?

Question 7. Outline the typical issues that should be addressed in a security review.

Question 8. What does the Notifiable Data Breaches Scheme entail?

Question 9. Who's responsibility is cyber security in a workplace?

Question 10. A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?

Group of answer choices
(a) Browser hijacker
(b) Ransomware
(c) Brute-force

Question 11. What issues can arise in relation to with BYOD policies?

Question 12. How could you educate employees on cyber security?

Attachment:- Cyber Security Awareness.rar

Reference no: EM133104806

Questions Cloud

Determine the benedict retained earnings on december : Benedict Company compiled the following financial information as of December 31, 2010: Determine the Benedict's retained earnings on December 31, 2010
Find example of small business that is using social media : Find an example of a small business that is using social media, such as Facebook, Twitter, or LinkedIn, to promote its products or services.
What is the total amount of revenue earned for the week : The company buys $6,000 worth of equipment with cash. What is the total amount of revenue earned for the week
Job-order-process and hybrid costing systems : "Job-Order, Process, and Hybrid Costing Systems" of Fundamental Managerial Accounting Concepts.
What issues can arise in relation to with byod policies : What issues can arise in relation to with BYOD policies and How could you educate employees on cyber security
What is the employee benefit expense for the current year : During the year, the entity recognized current service cost of P1,000,000, What is the employee benefit expense for the current year
Expectations between different generational cohorts : What is your impression of different generations in workplace? Have you observed differences in workplace expectations between different generational cohorts?
What were some of the key events of the financial crisis : What were some of the key events of the financial crisis and what are some key lessons learned thus far from the financial crisis
How much are the interest income : How much are the interest income in 2022 and the carrying amount of the bonds on Dec 31 if the bonds are held under hold to collect business model

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd