Law > ESSAY > Legal, Ethical and Security Awareness and Education Analysis (All)

Legal, Ethical and Security Awareness and Education Analysis

Document Content and Description Below

Full assignment and rubric contained in PDF. Do not create the PowerPoint specified in section C. Each subsection should have at least one source to backup any statement. Case study is attached which ... the document should be based on. Document format is also uploaded. Please answer the sections/rubric within the outline. Copy of the assignment is here. COMPETENCIES 4045.1.1: : Compliance Legal Requirements The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization. 4045.1.3: : Security Awareness Training and Education (SATE) The graduate outlines legal issues that should be included within the security awareness training and education (SATE) program of an organization. 4045.1.4: : Ethical Issues for Cybersecurity The graduate discusses the implications of ethical issues for specific cybersecurity actions within an organization. INTRODUCTION Information security professionals must understand how to apply ethical security principles and processes to their organizations. These standards should define the organization’s specific needs and demands to assure data confidentiality, integrity, and availability. An organization’s employees must be aware of the security challenges it is facing. In this task, you will analyze ethical challenges related to information security and develop a training plan for an organization, which will raise awareness of these challenges, convey strategies, and prevent unwanted developments. SCENARIO See the attached “TechFite Case Study” for information on the company being investigated. You should base your responses on this scenario. REQUIREMENTS Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course. A. Address ethical issues for cybersecurity by doing the following: 1. Discuss the ethical guidelines or standards relating to information security that should apply to the case study. a. Justify your reasoning and cite examples of relevant ethical guidelines used by other organizations. 2. Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices. 3. Discuss what factors at TechFite led to lax ethical behavior. B. Describe ways to mitigate problems and build security awareness by doing the following: 1. Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property. 2. Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite. a. Explain how the SATE program will be communicated to TechFite employees. b. Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite. C. Prepare a multimedia presentation with notes (e.g., Microsoft PowerPoint, Apple Keynote) (suggested length of 3–5 slides) to summarize TechFite’s ethical challenges and the related mitigation strategies from part B for its senior management. D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. E. Demonstrate professional communication in the content and presentation of your submission. [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$12.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
112
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 17, 2020

Number of pages

5

Written in

Seller


seller-icon
The Best Studies

Member since 3 years

1 Documents Sold


Additional information

This document has been written for:

Uploaded

Nov 17, 2020

Downloads

 0

Views

 112

Document Keyword Tags

More From The Best Studies

View all The Best Studies's documents »

$12.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·