Homework: assessing security culture | Cybersecurity

 

This week we learned about security culture and how to promote it within organizations.

It’s important that all employees are aware of common security risks and treat security seriously. The majority of cyberattacks aim to exploit human weaknesses with methods like phishing.

For this reason, people are most often the weakest link in an organization’s security defenses.

Scenario

  • Employees at SilverCorp are increasingly using their own personal devices for company work.
     
  • Specifically, over half of all employees check their work email and communications via Slack on their personal mobile phones.
     
  • Another 25% of employees are doing other work-related activities using work accounts and work-related applications on their personal phone.
     
  • Allowing sensitive work information to be shared on employees’ personal devices has a number of security implications.
     
  • You must research these security risks and use the security culture framework to develop a plan to mitigate the concerns.
     

Instructions

Compose the answers to the following four steps on Word Document.

Step 1: Measure and Set Goals

Answer the following questions:

  1. Using outside research, indicate the potential security risks of allowing employees to access work information on their personal devices. Identify at least three potential attacks that can be carried out.
     
  2. Based on the above scenario, what is the preferred employee behavior?
     
    • For example, if employees were downloading suspicious email attachments, the preferred behavior would be that employees only download attachments from trusted sources.
  3. What methods would you use to measure how often employees are currently not behaving according to the preferred behavior?
     
    • For example, conduct a survey to see how often people download email attachments from unknown senders.
  4. What is the goal that you would like the organization to reach regarding this behavior?
     
    • For example, to have less than 5% of employees downloading suspicious email attachments.

Step 2: Involve the Right People

Now that you have a goal in mind, who needs to be involved?

  • Indicate at least five employees or departments that need to be involved. For each person or department, indicate in 2-3 sentences what their role and responsibilities will be.

Step 3: Training Plan

Training is part of any security culture framework plan. How will you train your employees on this security concern? In one page, indicate the following:

  • How frequently will you run training? What format will it take? (i.e. in-person, online, a combination of both)
     
  • What topics will you cover in your training and why? (This should be the bulk of the deliverable.)
     
  • After you’ve run your training, how will you measure its effectiveness?
     

This portion will require additional outside research on the topic so that you can lay out a clear and thorough training agenda.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more