Type: Discussion Board
Unit: Importance of Training
Due Date: Tue,1/28/20
Grading Type: Numeric
Points Possible: 75
Points Earned:
Deliverable Length: 400–600 words
View objectives for this assignment
Go To:
·
Assignment Details
·
Scenario
·
Learning Materials
·
Reading Assignment
My Work:
Online Deliverables:
·
Discussion Board
Looking for tutoring?
Go to Smarthinking
Collapse All | Expand All Collapse All | Expand All
Assignment Details
Assignment Description
Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. This week, you will research the importance of cybersecurity policies for various user groups. You and your classmates will identify key user groups and identify requirements applicable to them.
The insider threat is still considered by the FBI and Department of Homeland Security to be the number one threat to an organization. This is most often attributed to employees exhibiting poor behavior or disregarding information and cybersecurity policies and procedures. Eighty percent of all breaches are caused by individuals clicking on links that lead to the installation of malware on computer systems or opening attachments that allow attackers to gain access to the organization’s computer systems and networks (Yasin, 2016). If undetected, these breaches can cause significant harm to an organization’s reputation and cost millions of dollars in damages. Some of these risky behaviors include the following:
· Writing down passwords and placing them under keyboards or posting them in the work area
· Browsing to nonwork-related Web sites, which can contain malware
· Tailgating into areas where accountability is required to be maintained
· Sharing username and other log-in credentials between employees
· Walking away from computers without locking the workstation
Include the following in your primary Discussion Board post:
· Explain why it is necessary for an organization to consider developing policies related to acceptable use of computer systems.
· Briefly describe at least 3 policies that would be considered best practices for any organization to adopt to reduce the risk of the accidental insider threat. You should include at least 2 from the following list and 1 of your own:
· Acceptable Use Policy
· Privileged Use Policy
· E-Mail Policy
· Finally, explain how you would communicate the importance of each policy to the user group that the policy is applicable to. When describing the communication, include the channel you will use to communicate.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
· What did you learn from your classmate’s posting?
· What additional questions do you have after reading the posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your posting and other classmates’ postings?
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reference
Yasin, R. (2016, May 24). Employee negligence the cause of many data breaches. DARK Reading. Retrieved from https://www.darkreading.com/vulnerabilities—threats/employee-negligence-the-cause-of-many-data-breaches-/d/d-id/1325656?
Reading Assignment
Unit 3: CYBR609 CTU Library Guide
Appendix: The Channels of Communicating the Message in
Communicating Strategy
Assignment Objectives
· Interpret the impact of the Digital Age on professional communications
Other Information
There is no additional information to display at this time.
Legend
· Extra Credit
· View Assignment Rubric
Collapse All | Expand All Collapse All | Expand All
Assignment Details
Assignment Description
Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).
Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. This week, you will research the importance of cybersecurity policies for various user groups. You and your classmates will identify key user groups and identify requirements applicable to them.
The insider threat is still considered by the FBI and Department of Homeland Security to be the number one threat to an organization. This is most often attributed to employees exhibiting poor behavior or disregarding information and cybersecurity policies and procedures. Eighty percent of all breaches are caused by individuals clicking on links that lead to the installation of malware on computer systems or opening attachments that allow attackers to gain access to the organization’s computer systems and networks (Yasin, 2016). If undetected, these breaches can cause significant harm to an organization’s reputation and cost millions of dollars in damages. Some of these risky behaviors include the following:
· Writing down passwords and placing them under keyboards or posting them in the work area
· Browsing to nonwork-related Web sites, which can contain malware
· Tailgating into areas where accountability is required to be maintained
· Sharing username and other log-in credentials between employees
· Walking away from computers without locking the workstation
Include the following in your primary Discussion Board post:
· Explain why it is necessary for an organization to consider developing policies related to acceptable use of computer systems.
· Briefly describe at least 3 policies that would be considered best practices for any organization to adopt to reduce the risk of the accidental insider threat. You should include at least 2 from the following list and 1 of your own:
· Acceptable Use Policy
· Privileged Use Policy
· E-Mail Policy
· Finally, explain how you would communicate the importance of each policy to the user group that the policy is applicable to. When describing the communication, include the channel you will use to communicate.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:
· What did you learn from your classmate’s posting?
· What additional questions do you have after reading the posting?
· What clarification do you need regarding the posting?
· What differences or similarities do you see between your posting and other classmates’ postings?
For assistance with your assignment, please use your text, Web resources, and all course materials.
Reference
Yasin, R. (2016, May 24). Employee negligence the cause of many data breaches. DARK Reading. Retrieved from https://www.darkreading.com/vulnerabilities—threats/employee-negligence-the-cause-of-many-data-breaches-/d/d-id/1325656?
Reading Assignment
Unit 3: CYBR609 CTU Library Guide
Appendix: The Channels of Communicating the Message in
Communicating Strategy
Assignment Objectives
· Interpret the impact of the Digital Age on professional communications
Other Information
There is no additional information to display at this time.
Legend
· Extra Credit
· View Assignment Rubric