Reference no: EM133104806
Task - Cyber Security Awareness
Scenario:
Read through the Task document on Canvas and create the following report. You will need to use the Information Technology Cyber Security Policy.
Your document must include:
1. Policies
a. Develop a set of policies and procedures for a work area that promote cyber security awareness and practices.
i. Is your login/screen locked down?
ii. Is your OS up to date?
iii. Do you have a strong password policy?
iv. Do you run antivirus updates, or utilize anti-virus, anti-malware and DNS filters?
v. Do you dispose of all data and equipment properly?
vi. Are mobile devices protected?
vii. Are employees educated?
viii. Do you have a security, backup and recovery plan in place?
ix. Do you know who to call for help?
2. Training
a. Create a PowerPoint to arrange training or updates to the employees to increase their awareness in cyber security matters (at least 2) from the following example:
i. Phishing attacks
ii. Removable media
iii. Passwords and authentication
iv. Physical security
v. Mobile device security
vi. Working remotely
vii. Public Wi-Fi
viii. Cloud security
ix. Social media use
x. Internet and email use
xi. Social engineering
xii. Security when working from home
3. Referencing
a. The Referencing style that we use is APA style.
Knowledge questions
Question 1. What is cyber security?
Question 2. Why Does Cyber Security Matter?
Question 3. Create a list of at least 5 sources of information you can access to determine new cyber security threats and trends.
Question 4. Which employees should complete cybersecurity awareness training courses?
Question 5. What topics should be covered in cyber defence training?
Question 6. Why would you need a cyber security policy in your workplace and what should be included?
Question 7. Outline the typical issues that should be addressed in a security review.
Question 8. What does the Notifiable Data Breaches Scheme entail?
Question 9. Who's responsibility is cyber security in a workplace?
Question 10. A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
Group of answer choices
(a) Browser hijacker
(b) Ransomware
(c) Brute-force
Question 11. What issues can arise in relation to with BYOD policies?
Question 12. How could you educate employees on cyber security?
Attachment:- Cyber Security Awareness.rar
Determine the benedict retained earnings on december
: Benedict Company compiled the following financial information as of December 31, 2010: Determine the Benedict's retained earnings on December 31, 2010
|
Find example of small business that is using social media
: Find an example of a small business that is using social media, such as Facebook, Twitter, or LinkedIn, to promote its products or services.
|
What is the total amount of revenue earned for the week
: The company buys $6,000 worth of equipment with cash. What is the total amount of revenue earned for the week
|
Job-order-process and hybrid costing systems
: "Job-Order, Process, and Hybrid Costing Systems" of Fundamental Managerial Accounting Concepts.
|
What issues can arise in relation to with byod policies
: What issues can arise in relation to with BYOD policies and How could you educate employees on cyber security
|
What is the employee benefit expense for the current year
: During the year, the entity recognized current service cost of P1,000,000, What is the employee benefit expense for the current year
|
Expectations between different generational cohorts
: What is your impression of different generations in workplace? Have you observed differences in workplace expectations between different generational cohorts?
|
What were some of the key events of the financial crisis
: What were some of the key events of the financial crisis and what are some key lessons learned thus far from the financial crisis
|
How much are the interest income
: How much are the interest income in 2022 and the carrying amount of the bonds on Dec 31 if the bonds are held under hold to collect business model
|